Single Blog

  • Home
  • Hackers are not hacking; they’re asking to gain access to your computer

Hackers are not hacking; they’re asking to gain access to your computer

Flash Tech has been providing security consultation since 1992.  One test in our risk and threat assessment is to gain access to a computer on the network we are assessing.  The best way for doing this is asking an employee for access.  We literally contact the company and speak to an employee, usually a receptionist or someone in the mailroom, and ask them for their network credentials and/or remote access to their computers.  They usually provide us the information we request.

Hackers have realized they can do the same thing.  Flash Tech does this on behalf of the company to test their network security.  Hackers are doing this with malicious intent.

Here is a common scenario.
[You receive a phone call from someone pretending to be from Microsoft or Apple] Hacker: Hello, we are from Microsoft/Apple tech support.  We received a notification that your computer is infected with a virus.  We would like access to your computer to remove the virus.
Customer: Thank you for calling me.  What do you want me to do?
Hacker: Open your browser and go to www.ThisIsAScamWhyCantYouSeeThat.com.  Click on “Load the hackers program”.  A plug-in will ask for permission to load a program.  Once you allow it, I will then be able to log into your machine remotely and place a, I mean remove the virus.
Customer: Thank you so much!

The customer does not realize they do not have a virus.  They will load a program on their computer and then give the hacker full access to their computer.  Once that is done, the hacker has free reign to do whatever they want.

How do you protect yourself?  Common sense.  Microsoft and Apple will not contact you to remove a virus.  Also, how did Microsoft and Apple get your phone number?  These hackers are calling random numbers.  Their speech is generic.

Be aware and protect yourself from this “hack”.