— But how did the infection occur?
— This is where your cadets came in handy. They were able to recruit one of the criminals, turning him into an informant, and eventually exposed the entire scheme. At the first stage of the fraudulent scheme, there were so-called “publishers” who created plausible technical support websites that displayed fake error messages and pop-ups urging users to call a toll-free number. They also created advertisements on social networks on various topics, which eventually redirected users to malicious sites.
The so-called "brokers" acted as intermediaries between the "publishers" and the call centers. They operated telephone servers through which they sold "call traffic" to the call center operator or other "brokers".
Technical support pages disguised as M security alerts croatia mobile database also used. The alerts informed visitors that their system had been infected with malware and that they should call a phone number for further assistance from an M employee.
- Wait, so it turns out that the citizens called themselves?
- That's right! All the victims were senior citizens who lacked the technical skills to suspect a scam.
— The fraudulent call center employees convinced subscribers to download and install a version of remote desktop software on their computers. This software allows operators to connect to the victim’s computer and supposedly solve a supposed “technical problem.” Victims are then asked to pay for the technical assistance received, usually via bank transfer or gift cards purchased from local stores.
According to a recorded phone conversation between a whistleblower and one call center owner, the scammers often asked victims to log into their bank accounts while the operator still had access to their systems, allowing them to steal bank account credentials.
— Ad how did they extort money from them?
-
- Posts: 702
- Joined: Mon Dec 23, 2024 3:15 am