Why Scareware Isn't So Scary

By: Bill Walter

The scene is you at your computer, ordering another item off a random search on a site you have not been to before. You have up-to-date antivirus software and security patches installed. Then it happens, a pop-up that states “Your computer is infected with the Armageddon virus! Please call (866) 555-1234 and we will remove it and restore your files.” 

You’re Not Alone

You would be surprised to know that hundreds, even thousands of people, call these numbers every day. They end up giving unknown malicious individuals access to their home and office PCs. The pop-up message is meant to scare you into thinking there is a major problem and they are the only ones who can help. 

These interruptions can be through pop-ups, direct phone calls and even audio. The creepiest outbreak starts much the same as our previous scenario. An audio interruption happens where a man’s voice urgently states, “This is your security software company. We noticed that you have been compromised. Call (855) 555-4321 immediately to have our experts correct this before your data is lost!”

What Happens After The Threat?

These scareware tactics can be very effective. Hackers use a socially engineered jarring message to interrupt you when you are focused on your work, search or purchase. It has just enough information in it to make you think it is a legit threat and offers a short clear path to a resolution.

If you don’t take a breath and think about it, you will fall victim to a much larger problem once they have hacked into your PC and do REAL damage.

What is the difference between scareware and ransomware? The answer: scareware is a simple and seemingly harmless pop-up or audio recording that easily gets past security software. The catch is that it only gets past security software if you complete the action that the message or recording is requesting. Without your help, the scareware will do no harm to your data. If you fall for their scam, a malicious user will connect to your PC and cause serious damage to your information. Even worse, by complying with these hackers’ requests, the door is always open for them to re-access your data, unlike ransomware situations where their viral code always needs to be installed first.

You Can Protect Yourself Against a Threat

The best form of protection is knowledge. Simply knowing that legitimate vendors will not contact you in this way is a huge step in the right direction. You can always seek out a professional’s assistance in order to sort out what is fact and what is fiction.

It is easy to stumble upon these types of malicious users. Like many things in life, it is best to take a moment to think before acting and possibly get a second opinion. You should be able to navigate the web without worrying too much about what is lurking around the corner in a dark alley of the internet. The trick is to think before you click or call an IT professional to prevent from falling into a hacker’s trap. 

Need Help?

Gross Mendelsohn’s Technology Solutions Group can help you protect your network from scary situations. If you’re worried about network security and vulnerabilities, contact us here to schedule a free network assessment with our network engineers, or call 410.685.5512. 

Published October 28, 2016

Cyber Security Wake-Up Call: What’s Putting Your Organization at Risk?

Learn how to lessen your exposure to cyber threats in this free webinar recording.

Cyber Security Wake-Up Call Screen Play

Small Businesses — Be On the Lookout for These Cyber Threats

If you think you’re immune to cyberattacks as a smaller-sized business, you’re wrong. Attackers don’t just pass small...

Threats and Vulnerabilities to Monitor This Cyber Security Awareness Month

Have you ever received an email from an unfamiliar source and wondered, “How did they know that information?” or “How...