Feeds

Even 'Your computer has a virus' cold-call gits are migrating off XP

Malware telescammers now target slab-fondlers+mobe-strokers

Combat fraud and increase customer satisfaction

Tech support scammers have begun targeting smartphone and tablet users with offers to fix non-existent problems – for exorbitant fees.

Cold call scams that attempt to hoodwink marks into paying for useless remote diagnostic and cleanup services have been a popular scam for years. Victims are often encouraged to sign up to multi-year support contracts costing hundreds of dollars for unnecessary and worthless services.

Enforcement action by groups such as the US Federal Trade Commission have only served to slow down the rate of growth of such scams, which are beginning to diversify.

Anti-virus firm Malwarebytes documented a case where a company called Speak Support was offering similar "services" to Mac fans back in October.

Jérôme Segura, senior security researcher at Malwarebytes, has followed up that research by uncovering a tech support scam (also known as the infamous fake Microsoft/Windows support technician call) targeting Android tablet and smartphone users.

Old dogs, old tricks, new platform

As before, the short con relies on social engineering techniques to create the perception of severe (in reality, imaginary) problems in urgent need of fixing. Victims are roped in using either cold calling or online advertising.

One example of mobile tech support scams identified by Segura is being promoted using Bing search results for Android support. The top two results for the search query “android slow tech support” from an Android tablet featured paid ads for an online tech support page promoting an 1-800 number.

The "support technicians" who answered the phone when Segura called one of these numbers informed him they weren't able to directly connect to his smartphone, instructing him to plug it into his computer before asking him to download remote login software (specifically LogMeIn).

At this point a genuine technician might be expected to run some sort of a scan or diagnostic on a connected phone. What actually happened was that after browsing the phone’s internal storage and checking its properties they asserted that there was some sort of infection on the device, and that pop-up permission screens for Adobe Flash or similar were evidence of this.

The technician went on to claim that a file – rundll32.exe, a standard Windows executable – was installed on the Android device as well as the PC and is a "very bad file". The scammer then proceeded with an attempt to hoodwink Segura by using a Windows feature designed to allow users to restore files from trash in an attempt to falsely portray his system as riddled with malware.

"Windows prefetch files are often used by scammers to make up non-existing threats," Segura explained. "In this case the technician removed all the ‘infected files’ and simulated a ‘re-infection’ by quickly restoring them from the Recycle Bin (Ctrl+Z trick)."

The ripoff phase

Many people who aren’t too tech-savvy are likely to take the whole performance at face value before ultimately "paying several hundred dollars for dubious services from rogue technical support companies," Segura concludes.

In the example caught by Segura, the dodgy support organisation ultimately tried to land him with a $299 bill for one year of so-called support. And the problem doesn't even stop at the rip off fee. "Keep in mind that those miscreants have direct access to your computer and data – with all the risks that this entails," Segura warns.

Segura recorded a video of the Android support scan in progress which can be found below.

Video of the security scan in progress

Fraudsters behind the same are showing a willingness to speculate in order to accumulate.

"While paying for ads requires a certain budget, ads have the advantage of funnelling higher quality prospects because people are actually already experiencing an issue," Segura explains on a blog post by Malwarebytes explaining how tech support scams have gone mobile. "In contrast, cold-calling is a very wasteful approach (low ratio of interested people for the number of outgoing calls) and not to mention that in many countries cold-calling is completely illegal."

Good luck killing the Hydra

Ridding the web of such scams is likely to prove akin to playing a game of Whack-A-Mole. The dodgy firms behind the ruse have prepared themselves to remain in operation even if the main outlets get suspended as a result of complaints.

"Very often, the same company will register different domain names with different phone numbers while in reality they all belong to the same group," Segura explains. "This technique allows them to create multiple identities which they can cycle through in case of abuse/complaint reports."

"Such sites can easily be spotted because the content is almost identical (copy/paste) and some of the graphics are the same," he added.

The progress of the tech support scam from Windows to Mac to tablet and smartphone reflects the changing way people access the internet.

"The tech support scam lives on by adapting to its environment and exploiting the never failing human factor," Segura concludes. "I can imagine that in a near future those fake support companies will remotely access the phone or tablet directly because more and more people no longer own a ‘traditional’ computer."

Malwarebytes complete guide on tech support scams can be found here. ®

SANS - Survey on application security programs

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.