Cybercriminals employ various techniques to infiltrate networks and steal sensitive data. Technical support scams, where fraudsters pose as major tech vendors, and IT-help desk scams, where malicious actors impersonate internal IT staff, are two mechanisms they use to achieve their objectives.
Small and midsize firms with limited IT oversight and resources often make for attractive targets for these schemes that prey on employee trust. Fortunately, enhancing employee awareness of these cyberattacks and implementing prevention strategies can help prevent these incidents and safeguard a business’s data, finances and reputation.
This article provides an overview of the threat landscape and describes the impacts these cybersecurity events can have on businesses. It also explains how to spot scams and offers actionable strategies employers can implement to prevent them from occurring.
To address the risks of tech support and internal help desk scams, employees should understand the threat landscape and how these schemes are executed. For tech support scams, malicious actors often use unsolicited pop-up ads, social media advertisements, or phishing calls or emails to try to convince a staff member that there is a technical issue requiring immediate attention. The message then directs the employee to bogus support numbers designed to appear as if they are for a well-known cybersecurity vendor. The fraudulent actor may then run a fake “scan” of the computer and find nonexistent “issues,” claiming they need remote access to fix the computer. They then may install malware that steals sensitive information; request enrollment in a fake support contract; offer to sell phony services, software or programs; or request payment for their dishonest services.
In internal help desk scams, cybercriminals seek to deceive employees by impersonating the business’s IT help desk. They may use voice phishing (or vishing) tactics, where they impersonate legitimate IT employees by making calls or leaving voicemails claiming there is an IT emergency or pretending that users’ login credentials need to be reset. Like tech support scams, these attackers aim to trick employees into granting access to their devices or networks. They may also utilize text message phishing (or smishing), illegitimate emails or phony collaboration platform messages to accomplish the same goals.
Through both of these scams, cybercriminals employ social engineering strategies to fool a business’s staff. For example, they communicate with urgency and utilize technical jargon and scare tactics (e.g., stating it is a major system issue) to pressure employees into divulging sensitive information.
Like other cyberattacks, tech support and internal help desk scams can be devastating to businesses. They can lead to data breaches and malware infections, causing significant financial damage through penalties, notification fees and lawsuits. They can also cause substantial business interruptions as the subsequent investigation and recovery process takes place. These cyberattacks can result in lasting reputational damage and erode client and stakeholder trust.
To prevent tech support and internal help desk scams from occurring, it is essential to recognize the signs that may indicate a cybercriminal is trying to carry out the scheme. Red flags to watch for include:
The following are several techniques employers can utilize to prevent tech support and help desk scams from happening:
Tech support and help desk scams can be devastating to businesses. By spotting red flags and implementing robust prevention strategies, employers can reduce their risk of these attacks being effective, safeguarding their security, finances and reputations.
Contact us today for more information.
Article Published By: Zywave, Inc.