The phone lines are open: Call 1-855-326-5442, while it's still working. Some possible answers will be "Google Technical Support", "Windows Technical Support", "Yahoo Technical Support", "Technical Support", and "Computer Scammers R Us".
OK, so maybe they didn't answer the phone the last way... but I called them out on it. Until such time as Level 3 Communications can be bothered to disconnect their phone service, I declare the Party Line open.
These are not legitimate call center employees. They are criminal scammers. The same contact number claims to represent many competing corporations, simultaneously.
Examples of deception and fraud include:
- Microsoft (or Google, Yahoo, etc) will NEVER call you to tell you there is a problem with your computer!!! (While Microsoft will offer phone support, it requires you, the user, to contact them for assistance. They do not have your name and number. Yahoo no longer offers phone support - or seemingly any support.)
- Claiming that the CLSID number is your "Windows license". (This number, 888dca60-fc0a-11cf-8f0f-00c04fd7d062 is the same on all copies, it is not unique)
- Claiming that the "netstat" command "shows hackers in your system" (The netstat command, by itself, shows a list of remote connections to your computer - which includes currently visited websites, it does not necessarily indicate hackers' presence)
- Claiming that the warnings and errors in Event Viewer indicate hackers, viruses or infections (These errors are normal, and do not indicate such things as the scammers attempt to claim)
- Being very pushy to engage in a remote session with your computer. (Yes, on occasion legitimate companies will ask for remote access. This is strictly voluntary, and the level of insistence is low.)
- Use of profanity, including "The F Word" (These are termination-worthy offenses, with a generally zero-tolerance policy toward even lesser oaths, let alone "the queen mother of all profanities". )
Keep in mind that these are criminal scumbags, not legitimate business people. Have fun with them. String them along. Waste their time. Do not, however, let them gain remote access to your computer. The more their time is wasted, the less it can be used to victimize innocent people, and harm their machines - or steal their money.
No comments:
Post a Comment