Internationalizing Efforts to Counter Tech Support Scams

The Central Bureau of Investigation, India's federal enforcement agency, recently conducted a series of criminal raids against illegal call centers across the country in an attempt to clamp down on tech support fraud.
These raids were the result of a joint referral made by Microsoft and Amazon - the first time both companies have joined forces to combat tech support fraud.
Tech support fraud is a major problem that impacts a wide variety of industries.
According to the U.S. FBI, tech/customer support and government impersonation have cost victims over $1 billion in losses.
The illegal call centers raided by the CBI were set up to impersonate Microsoft and Amazon customer support, targeting more than 2,000 customers across the US, Canada, Germany, Australia, Spain, and the UK. Read on to learn more about this threat and how the cybersecurity industry can join forces with government entities to raise the bar on collective defense against tech support fraud and other emergent threats.
Understanding Tech Support Fraud At its core, tech support fraud involves scammers who use scare tactics to trick victims into unnecessary technical support services.
Sometimes fraudsters will call their victims directly and impersonate representatives of a tech company, asking them to pay to fix a nonexistent device or software problem.
Threat groups use a variety of tactics to make these purported issues appear more realistic.
They can spoof caller IDs to display a legitimate support phone number from a trusted company or populate websites with fake error messages.
Security teams should monitor the latest threat intelligence and update users on current threat vectors, such as unsolicited offers of support; suspicious payment methods, like Bitcoin or gift cards; or instructions to download third-party software that doesn't originate from trusted security companies.
On the proactive side, Microsoft's Digital Crimes Unit is working to combat tech support scams by investigating tech support fraud networks and referring cases to law enforcement as appropriate.
We update our products and services with the latest threat intelligence to better protect consumers from various fraudulent tactics and provide guidance and resources on how to identify, avoid, and report suspicious activity.
Supporting Collective Defense Through Greater Collaboration The CBI's raid is an excellent, real-life example of the impact that security companies and law enforcement can have when they work together to advance collective defense by sharing intelligence and resources.
Cyber threats are ever-evolving, so trusted relationships and collaboration are necessary to improve collective knowledge, drive resilience, and mitigate global security risks.
There is a vast amount of cybercrime intelligence and data at our fingertips, but many companies cannot fully use this information due to the fragmented nature of cybersecurity.
In June 2022, the World Economic Forum launched the Cybercrime Atlas initiative, with support from companies including Microsoft, Fortinet, PayPal, and Santander Group.
The initiative takes a global collaborative approach to gather human-vetted open source intelligence from sectors such as finance, technology, telecommunications, cybersecurity, and cloud providers.
The Cybercrime Atlas specifically focuses on cyber-enabled and cyber-dependent crimes, such as business email compromise, credit card fraud, malware, and ransomware.
Although still a new initiative, the Cybercrime Atlas will create a standardized and scalable model for open source intelligence research.
This contextualized intelligence enables security teams to identify connections among cybercriminals, threat groups, and shared infrastructure.


This Cyber News was published on www.darkreading.com. Publication date: Wed, 06 Dec 2023 14:00:07 +0000


Cyber News related to Internationalizing Efforts to Counter Tech Support Scams

Internationalizing Efforts to Counter Tech Support Scams - The Central Bureau of Investigation, India's federal enforcement agency, recently conducted a series of criminal raids against illegal call centers across the country in an attempt to clamp down on tech support fraud. These raids were the result of a ...
11 months ago Darkreading.com
Unravelling Retirement Banking Scams and How To Protect Yourself - In the labyrinth of financial scams, one of the most insidious is the retirement banking scam. According to the FBI, in 2020 alone, financial scams targeting seniors netted more than $1 billion. It's a quiet crisis that we need to address, and ...
10 months ago Hackread.com
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
10 months ago Securityzap.com
How Criminals Are Leveraging AI to Create Convincing Scams - Cybercriminals create far more sophisticated scams with generative AI than traditional phishing scams. According to Visa research, scammers are fooling even the savviest internet users by launching pig butchering, inheritance, humanitarian relief ...
5 months ago Tripwire.com
CVE-2007-2850 - The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a ...
7 years ago
Best of 2023: Why is everyone getting hacked on Facebook? - Importantly, phishing relies on the victim trusting the scammer and taking an action - like clicking a link or sending bank account information - in order for the scammer to get what they want. It's not your imagination - social media scams really ...
10 months ago Securityboulevard.com
Tech Support Scammers Are Still At It: What To Look Out For - Tech scams are unfortunately still an issue in 2021, with technological advancements leading cybercriminals to find more creative ways to gain access to your data or charge you for services you don't need. As such, it's important to be aware of the ...
1 year ago Welivesecurity.com
UK to block all Social Media Scams - Starting May 2024, residents of the United Kingdom can breathe a sigh of relief, as social media platforms operating in the country have collectively committed to combating a range of scams on their respective networks. This includes everything from ...
11 months ago Cybersecurity-insiders.com
Wearable Tech Future: Where Fashion Meets Function - From fitness trackers and smartwatches to augmented reality glasses, the future of wearable tech is full of potential. In this article, we will explore the current benefits and challenges of wearable technology, uncover its different types and ...
11 months ago Securityzap.com
Netcraft Report Surfaces Spike in Online Healthcare Product Scams - A report published today by Netcraft, a provider of cybersecurity services, finds the volume of online scams relating to healthcare that are emanating from inexpensive top-level domains is spiking-accounting for as much as 60% of daily domain ...
10 months ago Securityboulevard.com
Worried About AI Voice Clone Scams? Create a Family Password - It's a classic and common scam, and like many scams it relies on a scary, urgent scenario to override the victim's common sense and make them more likely to send money. There's an easy and old-school trick you can use to preempt the scammers: ...
9 months ago Eff.org
Facebook Marketplace Is Being Ruined by Zelle Scammers - Some scams encourage people to upgrade their Zelle accounts to a business tier to receive money from a buyer, according to the Better Business Bureau, and come from emails mimicking Zelle, but with different domains. That upgrade appears to cost ...
10 months ago Wired.com
Computer Users Still at Risk of Falling Victim to Technical Support Scams - Tech support scammers will try to convince you that there is a major issue with your computer, such as a virus, and offer to fix it for a fee. They may also ask for remote access to your computer, which can be very dangerous as they can steal your ...
1 year ago Cybersecuritynews.com
Holiday Threats Surge as Christmas-Themed Scams Explode - As the winter holidays approach, malicious spammers have ramped up their efforts, flooding inboxes with a surge of unsolicited emails and Christmas-themed scams, according to a Bitdefender report. Key findings indicated a steady rise in ...
10 months ago Securityboulevard.com
CVE-2017-12757 - Certain Ambit Technologies Pvt. Ltd products are affected by: SQL Injection. This affects iTech B2B Script 4.42i and Tech Business Networking Script 8.26i and Tech Caregiver Script 2.71i and Tech Classifieds Script 7.41i and Tech Dating Script 3.40i ...
5 years ago
Romance Scammers are Adopting Approval Phishing Tactics - Romance scams are labor-intensive and time-consuming schemes to run. They can be lucrative, pulling in millions in stolen cryptocurrency, but they also can end up going nowhere if the targeted victim becomes suspicious or the bad actor decides there ...
11 months ago Securityboulevard.com
Tech workers fear being left unprepared for the future - While tech workers want to learn and organizations are spending thousands of dollars per employee on learning technology, it is not translating into improved on-the-job performance for 4 out of 10 IT employees, according to Skillable. Inadequate ...
10 months ago Helpnetsecurity.com
The Future of IT: Info-Tech 2024 Conference - PRESS RELEASE. TORONTO, Jan. 9, 2024 /PRNewswire/ - Info-Tech Research Group, a global leader in IT research and advisory, has announced that its flagship annual conference, Info-Tech LIVE, will be hosted this year at Bellagio in Las Vegas from ...
10 months ago Darkreading.com
US cybercops trace and return nearly $9M stolen by scammers The Register - The US has seized nearly $9 million in proceeds generated by exploiting more than 70 victims across the nation in so-called "Pig butchering" scams. Authorities tracked payments to cryptocurrency addresses belonging to one organization known for ...
11 months ago Theregister.com
Scam or not? BitDefender's Scamio AI promises to have the answer - Scamio is a new AI tool that promises to help Internet users combat scams. Especially users who are not tech-savvy may have difficulties distinguishing legitimate offers and messages from scams. ADVERTISEMENT. BitDefender is known for its security ...
11 months ago Ghacks.net
'Defunct' DOJ ransomware task force raises questions, concerns | TechTarget - "The Office of the Deputy Attorney General (ODAG) memorandum that established the Ransomware Task Force also contained several strategic areas, including directing the Ransomware Task Force to design and implement a strategy to disrupt and dismantle ...
1 month ago Techtarget.com
How to Protect Yourself from Job Scams: Essential Tips - The internet is a powerful tool in our career search, but it also provides cyber criminals with information and tactics they can use to exploit and deceive people looking for work. Job scams are sadly prevalent on the web, and if you’re job ...
1 year ago Tripwire.com
Building Your Defense Toolbox: Tools and Tactics to Combat Cyber Threats - The emergence of AI-powered malicious chatbots, such as WormGPT and FraudGPT, has enabled malicious threat actors to not only refine their skills but also consolidate all their malicious activities and tools into one, like a toolbox. Understanding ...
9 months ago Hackread.com
Holistic Approach To Privacy and Security in Tech - In this article, I would like to explain how I tackle privacy and security issues that are specific for large scale web and mobile applications and Big Tech. First, let's outline some of the biggest challenges Big Tech companies deal with in terms of ...
11 months ago Feeds.dzone.com
Enhancing Home Privacy with Technology: Your Digital Shield - In an ever-evolving world, technology has become increasingly integral to home privacy. Smart lock systems, video doorbells, motion sensors, security cameras, and automated privacy settings are some of the popular home privacy tech options available. ...
11 months ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)