Blog

Alert: Hackers Posing as IT Support and Hijacking Computers

b2ap3_thumbnail_technology_take_400.jpgOne minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the provided phone number, which only makes the situation worse.

First off, if you happen to find yourself a victim of a hack attack such as this, whatever you do, DON’T CALL THE PROVIDED PHONE NUMBER! The blog Delete Malware explains what will happen if you do: “If you call [the number] they won't actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords.”

Yikes.

At this point, the origins of the malware can’t be pinned down, which makes it rather confounding because it’s been known to activate and display the blue screen of death while browsing popular websites like YouTube and Facebook. However, what the user sees isn’t the real Microsoft blue screen of death--which takes up the entire computer screen. Instead, this particular malware only affects the Internet browser, as indicated by the exposed browser tabs and URL form as seen in this screenshot.

ib blue screen

Thankfully, the threat isn’t as severe as the real blue screen of death. In most cases, you can move on from this annoyance via the Task Manager (Ctrl + Alt + Delete), or by rebooting your machine. Still, it’s inconvenient for anyone when this happens in mid project, and it can result in losing unsaved work or even downtime. Plus, it’s not like rebooting your machine will rid the virus from the system. Without proper removal, it will lie dormant and pop up again at another random time.

Actually, the fake blue screen isn’t the biggest threat here. It’s all an elaborate ruse to play on one’s fears and get them to call the provided phone number. This is all to give the hackers an opening to take control of the PC, giving them the chance to do far worse damage than wasting the few minutes it takes to reboot.

It’s a classic social engineering scam where users are tricked into forking over their sensitive information after overreacting to a perceived threat. You’ve likely seen social engineering before with spam emails designed to convince you that you’re guilty of something like missing a court date or getting a speeding ticket. Although, upon further review, its spam messages are usually fairly easy to determine, which makes them easy enough to ignore. What makes this particular scam different is that you can’t ignore it like spam messages, especially when it locks up your browser.

Upon encountering malware such as this, you should immediately call the real IT professionals at 603-889-0800. We’ve got the tools it takes to analyze your system to determine the nature of the threat and properly remove it. In a situation like this, one thing that the hackers are hoping for is that the victim won’t know enough about who oversees their company’s IT that they’ll believe the number to be real. This is a dang shame because it sullies the good name of IT workers the world over.

To protect your system from hack attacks like this, you’ll want to have a proactive security measure in place, like the security monitoring service provided by White Mountain IT Services. For all of your organization’s IT needs, call the real IT professionals at 603-889-0800.

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

A new ransomware attack has surfaced, this time mostly targeting IT companies and their clients. The attack is specifically targeting the Kaseya platform. Kaseya is management software that many IT companies use to remotely manage and support technol...
Have you ever wondered which websites on the Internet are the most dangerous? Recently it’s been discovered that the majority of threatening websites on the Internet fall into some very easy-to-identify categories; or, more specifically, about 95 per...
Since the beginning of the COVID 19 pandemic, it has been clear that many companies were not prepared to continue their operations remotely. This was largely due to their leadership being convinced in recent years that allowing people to work remotel...
If you’ve spent any time using a computer, you probably know what a URL is. It is the address of a website. It typically starts with “http//:” or “https://” and directs the Internet browser on where the user would like to surf. Nowadays a threat coul...
According to a survey conducted by Splunk and Enterprise Strategy Group, more business leaders intend to funnel funding into their cybersecurity—88 percent of respondents reporting a planned increase into their investments, 35 percent reporting that ...
Having success in business often relies on developing trustworthy relationships. You have to trust your vendors and suppliers to get you the resources you need, you need to trust your staff to complete their tasks without putting your business in har...
Few things are scarier for a modern business to consider than the idea that they will be hacked, regardless of that business’ size or industry. After all, hacking can, will, and does cause significant damage across basically all aspects of your organ...
Starting in 2008, Verizon has produced a report outlining the cybersecurity incident trends that the previous year demonstrated. In doing so, they have provided a resource that gives businesses greater insights into where their cybersecurity efforts ...
Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity p...
Nothing is more frustrating than going to log into your device and finding out that you either cannot access it or that files you thought were there have been wiped. Unfortunately, this is the situation that many users of a specific device have recen...
The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to al...
“Hackers are a serious threat to modern businesses” isn’t exactly a novel statement, is it? However, if a hacker was to be lurking on your network, would you know the signs to help you catch them? Just in case, we wanted to share a few strategies tha...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions