Cybercriminals Posing as Tech Support to Steal Data: Symantec

Advertisement
By Press Trust of India | Updated: 25 April 2016 14:12 IST
With more and more people worldwide preferring online transactions, cybercriminals are using the 'fake technical support' model to steal consumer data, says a report by security software firm Symantec.

According to the report, fake technical support scams saw a 200 percent increase globally in 2015.

"With close to 5 lakh attacks last year, India ranked 11 amongst countries targeted the most by tech support scams... The countries targeted the most by tech support scams were the US, the UK, France, Australia, and Germany," Symantec Director Solution Product Management Asia Pacific and Japan Tarun Kaura told PTI.

He added that the difference now is that scammers send fake warning messages to devices like smartphones to prompt people to call attackers directly in order to dupe them into buying useless services or even install malware.

Advertisement

"In total, Symantec blocked more than 100 million tech support scams last year (globally)," he said.

Advertisement

Kaura said advanced criminal attack groups are now echoing the skill sets of nation-state attackers.

"They have extensive resources and a highly-skilled technical staff that operate with efficiency," he added.

Advertisement

Asked what consumers can do to protect themselves, Kaura said they should use strong and unique passwords for their accounts, which are changed every three months.

"Also, they should think before clicking. Opening the wrong attachment can introduce malware to users' system. Never view, open, or copy email attachments unless you are expecting the email and trust the sender," he said.

Advertisement

Kaura said users should also not disclose personal information or account details to someone calls claiming to be from a financial institution or tech support.

"Also, users should be wary of versions of software that claim to be free. These could expose them to malware. Social engineering and ransomware attacks will also attempt to trick users into thinking their computer is infected and get them to buy useless software or pay money directly to have it removed," he added.

Besides, users should try and limit the amount of personal information they share on social networks and online, including login information and birth dates.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Sister Midnight Streaming Online: Everything You Need to Know
  2. A 'Wet Lava World' Defies Expectations Around a Distant Star
  1. Secret Rain Pattern May Have Driven Long Spells of Dry and Wetter Periods Across Horn of Africa: Study
  2. Sister Midnight Out on OTT: Know Where to Watch This Radhika Apte-Starrer Online
  3. JWST Detects Thick Atmosphere on Ultra-Hot Rocky Exoplanet TOI-561 b
  4. Scientists Observe Solar Neutrinos Altering Matter for the First Time
  5. Uranus and Neptune May Be Rock-Dominated Planets, Study Suggests
  6. Kepler and TESS Discoveries Help Astronomers Confirm Over 6,000 Exoplanets Orbiting Other Stars
  7. Supernatural Thriller Jatadhara Arrives on OTT: Where to Watch Sonakashi Sinha-Starrer Film Online?
  8. OnePlus 15R Confirmed to Come With 32-Megapixel Selfie Camera, 4K Video Recording Support
  9. Rocket Lab Clears Final Tests for New 'Hungry Hippo' Fairing on Neutron Rocket
  10. Apple Rolls Out iOS 26.2 Update for iPhone With Liquid Glass Customisation, Changes to Apple Music, and More
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.