Microsoft IT Scam

Tags:
cybersecurity
Microsoft
Is there a simple HoneyPot setup that will allow assisting the detection of the "Microsoft IT Support Scam" instigators? These guys call on the phone monthly to thousands of individuals hoping to get someone to open a remote connection so they can drain private data and install spyware/ransomware. Would love to have an old PC just sitting by that I could plug in and give them a run for their money and maybe grab some data on them to forward to law enforcement or cybercrimes.


Software/Hardware used:
WIndows XP, DIY HoneyPot, Cybercrime Counter Strike
0

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Discuss This Question: 3  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • AndreaF
    What a great idea - I would love to see these buggers get stung!

    11,330 pointsBadges:
    report
  • bhannah
    I know that this is happening and I have warned all of my clients about this, and I send out emails to a lot of my friends not accept phone calls from these people. What I find is amusing is how upset they get when they are informed that I know that this is scam, and I am forwarding the number that they are calling on to the government. I have been called all sorts of names when this happens.
    4,580 pointsBadges:
    report
  • ToddN2000
    It surprises me how many people still fall for this ruse. If I did not initiate the call, I usually hang up and report to the DONOTALL.GOV website.
    132,840 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: