Blog

Alert: Hackers Posing as IT Support and Hijacking Computers

b2ap3_thumbnail_technology_take_400.jpgOne minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the provided phone number, which only makes the situation worse.

First off, if you happen to find yourself a victim of a hack attack such as this, whatever you do, DON’T CALL THE PROVIDED PHONE NUMBER! The blog Delete Malware explains what will happen if you do: “If you call [the number] they won't actually remove adware from your computer. They will hijack your computer and steal all of your bank information and passwords.”

Yikes.

At this point, the origins of the malware can’t be pinned down, which makes it rather confounding because it’s been known to activate and display the blue screen of death while browsing popular websites like YouTube and Facebook. However, what the user sees isn’t the real Microsoft blue screen of death--which takes up the entire computer screen. Instead, this particular malware only affects the Internet browser, as indicated by the exposed browser tabs and URL form as seen in this screenshot.

ib blue screen

Thankfully, the threat isn’t as severe as the real blue screen of death. In most cases, you can move on from this annoyance via the Task Manager (Ctrl + Alt + Delete), or by rebooting your machine. Still, it’s inconvenient for anyone when this happens in mid project, and it can result in losing unsaved work or even downtime. Plus, it’s not like rebooting your machine will rid the virus from the system. Without proper removal, it will lie dormant and pop up again at another random time.

Actually, the fake blue screen isn’t the biggest threat here. It’s all an elaborate ruse to play on one’s fears and get them to call the provided phone number. This is all to give the hackers an opening to take control of the PC, giving them the chance to do far worse damage than wasting the few minutes it takes to reboot.

It’s a classic social engineering scam where users are tricked into forking over their sensitive information after overreacting to a perceived threat. You’ve likely seen social engineering before with spam emails designed to convince you that you’re guilty of something like missing a court date or getting a speeding ticket. Although, upon further review, its spam messages are usually fairly easy to determine, which makes them easy enough to ignore. What makes this particular scam different is that you can’t ignore it like spam messages, especially when it locks up your browser.

Upon encountering malware such as this, you should immediately call the real IT professionals at 603-889-0800. We’ve got the tools it takes to analyze your system to determine the nature of the threat and properly remove it. In a situation like this, one thing that the hackers are hoping for is that the victim won’t know enough about who oversees their company’s IT that they’ll believe the number to be real. This is a dang shame because it sullies the good name of IT workers the world over.

To protect your system from hack attacks like this, you’ll want to have a proactive security measure in place, like the security monitoring service provided by White Mountain IT Services. For all of your organization’s IT needs, call the real IT professionals at 603-889-0800.

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

The online world is a scary place. Viruses, malware, spyware, adware, and more are all out there trying to get at your network. These threats are almost always prevalent, but compared to each other, some are vastly superior and far more dangerous and...
Even the most innocent Internet user can fall victim to the stray hacking attack, and it’s all thanks to the manner in which malware reverse-engineers software. This process is how a hacker finds vulnerabilities in software. However, a new security c...
Most hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process k...
Just like Silk Road (the illegal online black market designed to smuggle drugs around the world), there exists an online trade for zero-day exploits. Unsurprisingly, hackers find it exceptionally lucrative to sell these exploits for profit. Now, ther...
It might seem like the obvious reason for hacks and data loss is due to technology being unpredictable, but in all reality, it’s important to remember that some of the problems we experience with technology come from the people operating it. To this ...
For many Windows users, the fact that Microsoft is issuing Windows 10 incrementally came as a shock for those who patiently waited for its release date. While users wait, however, hackers are taking advantage of those who are less patient by creating...
Your organization is constantly at risk of being attacked by malicious entities. This is a fact that modern businesses have to live with. If this is the first time you’re seriously contemplating cyber security, you need to take all potential options ...
Have you ever wondered which websites on the Internet are the most dangerous? Recently it’s been discovered that the majority of threatening websites on the Internet fall into some very easy-to-identify categories; or, more specifically, about 95 per...
Technology is often exploited by hackers for their benefit, but one avenue of attack that’s consistently neglected is the mobile device. Smartphones and tablets are arguably at greater risk than desktops and workstations due to them being exposed to ...
Hackers are always trying to find the latest exploits to infiltrate unsuspecting businesses. One of the most dangerous and arguably the most difficult to identify is called a social engineering attack, which is where the hacker exploits the end user,...
The Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, i...
Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, t...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services


33 Main Street, Suite 302
Nashua, NH 03064

 


121 Riverfront Drive
Manchester, NH 03102

603-889-0800

Open Positions