{"id":1553,"date":"2018-12-12T18:47:02","date_gmt":"2018-12-12T18:47:02","guid":{"rendered":"http:\/\/www.brett-tek.com\/?p=1553"},"modified":"2018-12-12T18:51:51","modified_gmt":"2018-12-12T18:51:51","slug":"article-popup-scammers-plan-of-attack","status":"publish","type":"post","link":"https:\/\/www.brett-tek.com\/?p=1553","title":{"rendered":"ARTICLE: Popup Scammers&#8217; Plan of Attack"},"content":{"rendered":"\n<p>More common to encounter than viruses these days are scammers; they\u2019re not interested in infecting or damaging your PC, but in taking your money.&nbsp; There\u2019s a typical plan of attack scammers follow, and the sooner you realize it\u2019s a scam the less costly damage control will be.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">STEP 1: Getting You to Call Them (fearmongering and lies)<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/scam-meme.jpg\" alt=\"\" class=\"wp-image-1554\" width=\"276\" height=\"219\" srcset=\"https:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/scam-meme.jpg 500w, https:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/scam-meme-300x238.jpg 300w\" sizes=\"auto, (max-width: 276px) 100vw, 276px\" \/><\/figure><\/div>\n\n\n\n<p>The most typical method scammers use for you to call them is\nthrough a pop-up window that appears while you\u2019re browsing the Internet.&nbsp; Often through clicking innocently enough on\nadvertisements or \u201cclick bait\u201d articles, you will go to a site that then\nproduces a concerning pop-up message.<\/p>\n\n\n\n<p>At this stage, you\u2019re likely not infected by anything.&nbsp; Whatever the pop-up is saying is simply a\nscare tactic to make you react right away. \u201cDon\u2019t call your local technician, don\u2019t\ncall a family member or friend, just call us right now!\u201d<\/p>\n\n\n\n<p>The pop-up is often a \u201csticky\u201d one that doesn\u2019t easily close and sometimes has an audible message speaking.&nbsp;Though there are more advanced ways to forcefully close the offensive window, sometimes you can resolve this by simply restarting Windows.&nbsp; Once Windows starts back up, reload the web browser.&nbsp; Depending upon how it\u2019s setup the browser may ask if you want to reopen\/restore websites you were previously in.&nbsp; Do NOT!&nbsp; Return to your normal homepage and everything should be right with the Internet once more.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">STEP 2: Let Them Remotely Connect to Your PC (the foot in the door)<\/h3>\n\n\n\n<p>If you do call the phone number, you\u2019ll be in touch with a scammer who\u2019s first task will be to get you to let them connect onto yourPC.&nbsp; The software they use varies and is often legitimate software; but, as with any tool, in the wrong hands it can do great harm.&nbsp; In this case, you have now given a scammer significant access to your PC.&nbsp;They can see your screen, move your mouse, and perform other tasks in the background.<\/p>\n\n\n\n<p>The problem at this stage and onward is that even if you decide this is a scam and hang up on them, they\u2019re still on your PC. Even if you turn your computer off or disconnect the Internet, the software may still be installed. When you inevitably power back on and reconnect to the Internet, the remote software will still be there, waiting to automatically re-establish a connection back with the scammers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">STEP 3: Convince You There&#8217;s Something Wrong on Your PC (&amp; that only they can fix it)<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/37s1e.jpg\" alt=\"\" class=\"wp-image-1555\" width=\"297\" height=\"214\" srcset=\"https:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/37s1e.jpg 480w, https:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/37s1e-300x216.jpg 300w\" sizes=\"auto, (max-width: 297px) 100vw, 297px\" \/><\/figure><\/div>\n\n\n\n<p>The \u201cpeople skills\u201d of the scammers vary, but their ultimate goal once connected to your computer is to convince and reaffirm to you that there\u2019s something wrong with your PC, that they\u2019re the only ones who can fix it, and that it must be addressed immediately.&nbsp;This all plays into keeping the momentum moving towards their end goal, and the less time you get to second-guess your decisions or what they\u2019re doing on your PC the better it is for them.<\/p>\n\n\n\n<p>The scammer may look like they\u2019re performing initial scans or checking log files all in an attempt to play the part of a diagnosing technician.&nbsp; Even if there is a legitimate issue with your PC and the scammer acknowledges it, that only helps their end goal; but that goal isn\u2019t to fix your computer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">STEP 4: Getting Your Credit Card Info (damned if you do, damned if you don&#8217;t)<\/h3>\n\n\n\n<p>This is what the scammer has been leading you to: getting your credit card information and paid.&nbsp;They may offer a flat or annual charge and provide you with contact information (typically in a text file on your desktop screen).&nbsp; You are in the scammer\u2019s endgame, and it\u2019s possible that either decision you make here will have negative consequences.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/cd-0715-4-1-credit-card-scam-article.jpg\" alt=\"\" class=\"wp-image-1556\" width=\"247\" height=\"153\" srcset=\"https:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/cd-0715-4-1-credit-card-scam-article.jpg 510w, https:\/\/www.brett-tek.com\/wp-content\/uploads\/2018\/12\/cd-0715-4-1-credit-card-scam-article-300x185.jpg 300w\" sizes=\"auto, (max-width: 247px) 100vw, 247px\" \/><\/figure><\/div>\n\n\n\n<p>If you provide your credit card information, they will charge you and leave.&nbsp; They\u2019re job is done, and they\u2019ll typically just move on to the next person that calls the phone number from the pop-up scam message.&nbsp; The remote software they used will likely remain on your PC giving them the ability to remotely reconnect.<\/p>\n\n\n\n<p>If you refuse to provide your credit card information, things can get dicey.&nbsp; The scammer usually becomes more aggressive and may cause problems on your PC.&nbsp; Remember, your computer is in a compromising position with them currently on it with significant access to do some damage.&nbsp; The remote software they\u2019re using is still active even if you hang up on them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Can You Do?<\/h3>\n\n\n\n<p><strong>Don\u2019t call the phone number<\/strong>. The pop-up message is a lie.&nbsp;You may need assistance removing the message, but don\u2019t ask the scammers for that help.<\/p>\n\n\n\n<p><strong>Don\u2019t let them onto your PC<\/strong>.&nbsp; OK, so you called the number.&nbsp; Don\u2019t bother talking to or convincing them that your PC is fine or that what they\u2019re doing is wrong.&nbsp; Think of them as drug dealers: for them it\u2019s just a business, and you\u2019re wasting your time trying to make them feel bad about it.&nbsp; Just hang up.<\/p>\n\n\n\n<p><strong>Don\u2019t give them your credit card information<\/strong>.&nbsp; OK, so you let them onto your computer.&nbsp; It\u2019s best to follow the old adage to \u201cnever negotiate with terrorists or give them what they want\u201d.&nbsp; Immediately power-off your PC by pressing and holding the power button for 5-10 seconds.&nbsp; Yes, it\u2019s not a recommended method, but this is an emergency and you want to severe the connection the scammers have with your PC right away. Leave the computer off and <a href=\"http:\/\/www.brett-tek.com\/?page_id=37\">call BRETT-TEK<\/a>.&nbsp; The remote software that the scammers used must be removed before the system is reconnected to the Internet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A Story of a Scammed Client<\/h3>\n\n\n\n<p>Here\u2019s a clip of me describing an experience I had with aclient and his PC when an aggressive scammer decided to do more than just \u201cfix\u201d his computer.<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube aligncenter wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"1170\" height=\"658\" src=\"https:\/\/www.youtube.com\/embed\/dsxoBRcasV4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption>A Story of a Scammed Client<\/figcaption><\/figure>\n\n\n\n<p>I\u2019ve helped hundreds of local clients who\u2019ve either been victims of scams or were in the process of being scammed.&nbsp; Sadly, even if just a fraction of the millions of people scammers reach provides them with money, they\u2019ll continue to do this.&nbsp; If you\u2019ve been the victim of a scam or worried someone you know has been, please <a href=\"http:\/\/www.brett-tek.com\/?page_id=37\">call BRETT-TEK<\/a>.&nbsp; We can perform a check on your PC and help resolve what they may have done to it.<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>More common to encounter than viruses these days are scammers; they\u2019re not interested in infecting or damaging your PC, but in taking your money.&nbsp; There\u2019s a typical plan of attack scammers follow, and the sooner you realize it\u2019s a scam the less costly damage control will be. STEP 1: Getting You to Call Them (fearmongering&hellip;<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.brett-tek.com\/?p=1553\" class=\"themebutton2\">Read More<\/a><\/p>\n<p><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1,"featured_media":1554,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-1553","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"_links":{"self":[{"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=\/wp\/v2\/posts\/1553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1553"}],"version-history":[{"count":2,"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=\/wp\/v2\/posts\/1553\/revisions"}],"predecessor-version":[{"id":1559,"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=\/wp\/v2\/posts\/1553\/revisions\/1559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=\/wp\/v2\/media\/1554"}],"wp:attachment":[{"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.brett-tek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}