Microsoft Windows Support Call Scams: 7 Facts
Security researcher turns the tables on a caller peddling fake fixes for malware supposedly infecting his Windows PC.
Security professionals know to steer clear of such scams. Since they persist, scammers are apparently tricking sufficient numbers of consumers into forking over their cash--$250 or more, in some cases--to fix the virus infections identified by the caller's in-house technicians. Windows phone scams--targeting PC owners--appear to have begun in earnest in 2008, and been on the rise ever since, according to the Guardian. Meanwhile, their popularity is fueled by "the availability of cheap phone calls and labor in countries like India," according to Which?, a U.K. consumer rights group.
To fight back, many people try to tie up the cold callers on the phone for as long as possible, or even provide them with fake credit card numbers. But after receiving repeat calls, one malware researcher decided to see what exactly the scammers were doing by granting them access to his virtual test machines, which he used to record their activities. "The goal was to find out who they were and exactly what the scam was. Luckily I was able to get hold of information such as their internal IP addresses, the PayPal accounts used to wire money, and the numbers they are calling from," said Kaspersky Lab security researcher David Jacoby in a blog post.
[ Don't risk legal troubles to fight cybercrime. See Strike Back At Hackers? Get A Lawyer. ]
Here are seven facts he learned about the scams.
1. Caller Claims To Be With Microsoft
Microsoft support scams are a type of social engineering attack, which succeeds not through attackers' technical sophistication, but rather by tricking people via smooth talking and playing on their fears. In Jacoby's case, he said the caller pretended to be from a department--non-existent, by the way--at Microsoft that was following up indications that his computer was either broken or had been infected by malware.
2. Windows Errors Easy To Find
To make the case that his PC showed signs of malware infection, Jacoby said the woman who called him instructed him to open the Windows Event Manager, so that he could see numerous error messages which she said indicated that his system had been compromised. "The event viewer does show error messages, but not directly related to an infection," said Jacoby. "Almost all computers have errors in the log files, especially if the computer has not been re-installed lately and is running a lot of programs."
3. Windows Processes Used For Sleight Of Hand
Jacoby said the scammer then instructed him to execute a DOS command to reveal the system's unique ID and allow her to verify that it was referencing the correct--infected--system. The caller then read out the license ID, and asked Jacoby if it matched the ID he was seeing on his screen. It did, but that was because the DOS command he'd run revealed the ID for a file extension that ships on all Windows PCs. The caller then instructed him to run the "verify" DOS command to see if his Windows license could be verified, and said that an "off" setting--which Jacoby saw--would indicate that the license couldn't be verified. But in reality, this setting is only used to "enable/disable operating system verification that data has been written to disc correctly," he said, and has nothing to do with the Windows license.
4. Scammers Wield Drama
But after the second DOS command returned an "off" response, Jacoby said the caller began "screaming 'oh my god!' in my ear, she was super upset that my license was not verified; according to her this meant that no security patches could be installed." After recommending that Jacoby allow her technician to directly access his PC, he agreed. "I was running everything in an empty virtual machine," he said, and found that the organization offering to repair his PC was using free--and on its own, legitimate--remote-administration software known as AMMYY.
5. Remote Access Scans Trigger Falsehoods
While he was still on the phone with the caller, Jacoby watched as the remote access tool administrator--on his PC screen--opened an old certificate, which said that it dated from 2011. At this point, the woman who had called him claimed that his PC hadn't been updated since 2011, and told him that he needed "to install security software which will protect me against viruses, malware, Trojans, hackers, and other things." He agreed, and watched as an application ("G2AX_customer_downloader_win32_x86") was installed and run on his PC, which indicated that he had "successfully updated the software license for lifetime."
6. Social Engineering Tricks The Scammers
After the supposed fix, and with the caller still on the line, Jacoby was given a PayPal account into which he was supposed to pay $250. When the fake credit card data that he supplied to the caller didn't work, he asked the caller to browse to a website where his friend, he said, had left credit card data in plain text. After the caller browsed there, he captured her IP address, disconnected the call, and reviewed which phone numbers the caller had used. "After collecting all the information, I have now contacted all the appropriate people, such as the security team at PayPal [and] various law enforcement agencies with the hope that we can stop these people," said Jacoby.
7. Scammers Avoid Attack Software
To recap, the Microsoft Windows malware phone scam succeeds in part because it's a social engineering attack: Callers tell Windows owners to input a few commands into their PC, then "interpret" the results to highlight how the system is infected with malware. Furthermore, the remote-access tool used by scammers typically doesn't trip any security alarm bells, because such tools can be used for benign purposes, such as actual customer support. "The software that they were using was not malicious in any way, which means that no security software can detect these types of scams," he said.
Jacoby, of course, had a test machine at the ready, which was devoid of any sensitive information. The average business users or consumers, however, typically have some type of sensitive data stored on their PC. In other words: don't try this type of security research at home. "If you ever get a call 'from Microsoft' stating that there are some indications that your computer is broken or infected--please hang up," he said.
Don't get tripped up by these common payment card data security mistakes: failing to vet the auditor, skipping the pre-audit assessment, losing track of your data, and seven more. Also in the new, all-digital 10 Ways To Fail A PCI Audit issue of Dark Reading, Test data security before the auditor arrives, Tim Wilson recommends. (Free registration required.)