U.S. officials today struck at six long-running scams, freezing assets of 14 companies charged with bilking consumers by posing as tech support from Microsoft, Symantec and others.
In a press conference, the Federal Trade Commission said at the agency's request a federal judge had issued restraining orders and frozen the assets of more than two dozen companies and individuals.
"The tech support scam artists we are talking about today have taken scareware to a whole other level of virtual mayhem," said FTC chairman Jon Leibowitz, in a statement.
The scammers cold-call consumers posing as representatives of major technology companies, including Dell, McAfee, Microsoft and Symantec, telling them that their Windows PCs are infected with malware and offering to help them scrub their machines -- for a price.
According to the FTC, most of the scams it hit operated out of India and targeted consumers in Australia, Canada, the U.K., U.S., and other English-speaking countries.
In court papers, the FTC said the scammers ran their schemes from "virtual offices" -- just mail-forwarding outlets -- used 80 different domain names for their bogus websites, and relied on 130 different phone numbers, all part of an attempt to evade the law.
The trick isn't new. It's been in circulation for at least two years. Computerworld regularly receives email from people reporting they fell for the scam and asking for advice on how to get back their money.
In the ploy, the callers try to fool users into believing that their computer is infected, saying they've monitored malicious activity on the PC. The impersonation of an employee of Microsoft or antivirus software giant Symantec gives credence to the tale. At times, the scammers say that they're just calling on behalf of, say, Microsoft, or that they're only affiliated with a name-brand company, like Symantec.
To prove that the consumer's PC is infected, the scammers ask users to open Windows' Event Viewer, a utility that logs significant events on the PC, including program errors. The logs typically contain scores of errors, virtually all of them harmless. But to many users, they may look alarming.
Once the telemarketers convince a user that his machine is riddled by malware, they steer them to a website to download software that then lets the bogus "technician" remotely access the PC.
The con artists charge for their "help," and load the PC with worthless software. In some cases, that's malware that steals online account information and passwords.
According to the FTC's allegations, the six scamming operations charged between $49 and $450 for their "expertise," pressuring consumers into buying a long-term security contract, buying security software or paying for phony "repairs" that amounted to deleting a few innocuous files.
Sign up for Computerworld eNewsletters.