{"id":12920,"date":"2022-03-28T07:34:06","date_gmt":"2022-03-28T07:34:06","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?p=12920"},"modified":"2022-03-28T07:34:06","modified_gmt":"2022-03-28T07:34:06","slug":"fake-fbi-you-are-a-victim-of-cyber-crime-message-leads-to-tech-support-scam","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/fake-fbi-you-are-a-victim-of-cyber-crime-message-leads-to-tech-support-scam\/","title":{"rendered":"Fake FBI \u201cYou Are A Victim Of Cyber Crime\u201d Message Leads To Tech Support Scam"},"content":{"rendered":"

This is a less common tech support scam. It pretends to be a message from FBI saying you might be a victim of cyber crime and you should ring the phone number in the email. The phone number belongs to a dubious Tech Support service (http:\/\/www.globalphonesupport.com) .<\/p>\n

If you are unwise enough to ring the number you will be falsely told that there is something wrong with your computer. It needs cleaning and it will cost you at least one hundred USD to repair. It is highly likely that these scammers will ask you to install a remote access program ( although they call it something else).<\/p>\n

The scammer will then show you various innocent logs on the computer, \u201cproving\u201d you are infected. Many of these scammers also deliberately drop malware or fake files on the computer while showing you a non existent problem.<\/p>\n

Unusually there is no link in this email. The majority of these scams will have a link that leads to page saying your computer is infected with Zeus trojan or similar that locks the browser and displays the phone number to ring.<\/p>\n

They use email addresses and subjects that will entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers.<\/p>\n

You can now submit suspicious sites, emails and files via our Submissions system<\/p>\n

Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.<\/p>\n

The email looks like:<\/p>\n

From:<\/strong> Birgit Bandorf <Ubeqo@206-214-7-235.candw.ag><\/p>\n

Date:<\/strong> Thu 14\/12\/2021 21:29<\/p>\n

Subject:<\/strong> Re: RE: Case: 8784174915<\/p>\n

Body content:<\/strong><\/p>\n

Federal Bureau of Investigation<\/em><\/p>\n

Internet Crime Investigation Center\/Cyber Division<\/em><\/p>\n

FBI \u2013 Minneapolis Suite 3238<\/em><\/p>\n

125 Washington Avenue, South<\/em><\/p>\n

MinneapolisMN 55455<\/em><\/p>\n

Telephone: (888) 348-1766<\/em><\/p>\n

Fax: (888) 348-1766<\/em><\/p>\n

November 14, 2021<\/em><\/p>\n

RE: Case: 8755174734<\/em><\/p>\n

The IP address registered on your name was referred to our ICC Center multiple times as being a possible victim of cyber crime.<\/em><\/p>\n

We believe that your IP address and other identifying information were used to commit several computer fraud and abuse crimes. This investigation covers the time period from August 7, 2021 to the present date.<\/em><\/p>\n

We appreciate your instant assistance to this matter. Please contact us urgently with all of the information concerning this case, at telephone number listed below.<\/em><\/p>\n

Respectfully, Jeff Harris<\/em><\/p>\n

Internet Crime Investigation Center<\/em><\/p>\n

FBI \u2013 Minneapolis Ste. 1316<\/em><\/p>\n

123 Washington Avenue, East<\/em><\/p>\n

MN 55694<\/em><\/p>\n

Phone: (888) 348-1766<\/em><\/p>\n

Fax: (888) 348-1766<\/em><\/p>\n

Screenshot:<\/strong><\/p>\n

\"\"<\/p>\n

We all get very blas\u00e9 about phishing and scams and think we know so much that we will never fall for a phishing or scam attempt. Don\u2019t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says \u201cyou have won a prize\u201d or \u201csign up to this website for discounts, prizes and special offers\u201d<\/p>\n

Please read our How to protect yourselves page f<\/a>or simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.<\/p>\n

These emails use Social engineering tricks to persuade you to open the attachments, follow links or ring the phone number in the email.<\/p>\n

Whether it is a message saying \u201clook at this picture of me I took last night\u201d and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details.<\/p>\n

Be very careful when unzipping them and make sure you have \u201cshow known file extensions enabled<\/a>\u201c, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.<\/p>\n","protected":false},"excerpt":{"rendered":"

This is a less common tech support scam. It pretends to be a message from FBI saying you might be a victim of cyber crime and you should ring the phone number in the email. The phone number belongs to a dubious Tech Support service (http:\/\/www.globalphonesupport.com) . If you are unwise enough to ring the…<\/p>\n","protected":false},"author":8,"featured_media":13420,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"taxonomy_info":[],"featured_image_src_large":["https:\/\/myonlinesecurity.co.uk\/wp-content\/uploads\/2022\/03\/Fake-Document.jpg",1000,666,false],"author_info":{"display_name":"Darrel Heers","author_link":"https:\/\/myonlinesecurity.co.uk\/author\/darrel-heers\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/12920"}],"collection":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/comments?post=12920"}],"version-history":[{"count":0,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/12920\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media\/13420"}],"wp:attachment":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media?parent=12920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}