Tech support scammers use denial of service bug to hang victims
Process pig keeps eyes glued on fraudsters' phone number.
Tech support fraudsters have taught an old denial of service bug new tricks to add a convincing layer of authenticity to scams.
The HTML5 bug allows sites to chew up a mountain of processor capacity, causing browsers to hang.
Scammers deploy the few lines of code needed to trigger the bug, hang browsers and then display a screen that says malware has been detected.
MalwareBytes researcher Jérôme Segura says this trick will often prevent users from opening the Windows task manager or taking other actions, because they believe the fake malware notification.
Segura says "...scammers really want their victims to see the instructions on screen, and in particular the phone number to call to fix their computer."
"This is a clever use of this bug because the computer that visited this site is essentially stuck with the CPU and memory maxed out while the page is not responding.
"All of this is done by using a few lines of code."
Segura reported the bug abuse to Google's Safe Browsing team but has yet to hear of a fix.
Your correspondent called the scammer's phone number (+18445073556) as part of The Register's ongoing-but-futile bid to bribe the details of scamming operations from agents, but heard only strange noises.
The most likely target of these scams are millennials, according to Microsoft research last month that found that age group are far more likely to fall hook and sinker for the cons than greybeards.
The denial of service code.
This could be thanks to the proliferation of blue screen of death tech support scams on popular torrent sites like Kick Ass Torrents and The Pirate Bay.
Some security wonks are fighting back. Ivan Kwiatkowski In August permitted a tech support scammer to access his virtual machine and tricked the operator into opening a file that infected their machine with the Locky ransomware, a nice case of the biter being bitten. ®