Cybercriminals Posing as Tech Support to Steal Data: Symantec

Advertisement
By Press Trust of India | Updated: 25 April 2016 14:12 IST
With more and more people worldwide preferring online transactions, cybercriminals are using the 'fake technical support' model to steal consumer data, says a report by security software firm Symantec.

According to the report, fake technical support scams saw a 200 percent increase globally in 2015.

"With close to 5 lakh attacks last year, India ranked 11 amongst countries targeted the most by tech support scams... The countries targeted the most by tech support scams were the US, the UK, France, Australia, and Germany," Symantec Director Solution Product Management Asia Pacific and Japan Tarun Kaura told PTI.

Advertisement

He added that the difference now is that scammers send fake warning messages to devices like smartphones to prompt people to call attackers directly in order to dupe them into buying useless services or even install malware.

"In total, Symantec blocked more than 100 million tech support scams last year (globally)," he said.

Advertisement

Kaura said advanced criminal attack groups are now echoing the skill sets of nation-state attackers.

"They have extensive resources and a highly-skilled technical staff that operate with efficiency," he added.

Advertisement

Asked what consumers can do to protect themselves, Kaura said they should use strong and unique passwords for their accounts, which are changed every three months.

"Also, they should think before clicking. Opening the wrong attachment can introduce malware to users' system. Never view, open, or copy email attachments unless you are expecting the email and trust the sender," he said.

Advertisement

Kaura said users should also not disclose personal information or account details to someone calls claiming to be from a financial institution or tech support.

"Also, users should be wary of versions of software that claim to be free. These could expose them to malware. Social engineering and ransomware attacks will also attempt to trick users into thinking their computer is infected and get them to buy useless software or pay money directly to have it removed," he added.

Besides, users should try and limit the amount of personal information they share on social networks and online, including login information and birth dates.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Samsung Galaxy A57 5G: Smart Choice That Redefines Mid-Range Value
  2. iPhone 17 Pro Max At Rs. 1,02,900 in Apple 50th Anniversary Sale
  3. Vivo T5 Pro 5G Confirmed to Launch in India Soon With These Features
  4. Google Pixel 10 Users Can Now Play Steam Games Offline via GameNative
  5. These Four Motorola Phones Are Now Eligible to Get Android 17 Beta Updates
  6. Here's When the Oppo K15 Pro Series Could Be Launched in India
  1. Microsoft Releases New AI Models That Can Generate Images, Audio and Transcribe Text
  2. Redmi K Pad 2, New Redmi Laptops Tipped to Launch Alongside Redmi K90 Ultra
  3. Google Pixel 10 Users Can Now Play Steam Games Offline via GameNative 0.9.0
  4. Circle Unveils cirBTC Token to Expand Bitcoin’s Role in DeFi Ecosystem
  5. Honor 600 Series Could Launch Soon as Company Starts Teasing Debut of a New Phone
  6. Microsoft AI Chief Wants to Deliver State-of-the-Art AI Models by 2027: Report
  7. Infinix GT 50 Pro Leak Shows Design, Cooling, Gaming Features Ahead of Anticipated Launch
  8. Samsung Galaxy Z Fold 8, Galaxy Z Flip 8 to Stick With Older M13 OLED Panels: Report
  9. Crypto Hack Losses Drop to $168.6 Million in Q1 2026 Despite Ongoing Risks
  10. Google Vids Will Now Let All Users Generate Veo 3.1 AI Videos for Free, New Features Added
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.