Tech support scammers are impersonating customer representatives from antivirus companies Tech support scammers have started targeting antivirus customers and have diversified their techniques, according to reports from antivirus vendors Avast and ESET.Cold-calling scams that target English-speaking computer users have been a common occurrence during the past two years. The scammers usually pose as tech support engineers who work for Microsoft or ISPs in an attempt to trick victims into buying questionable security or PC optimization software.However, it seems that these attacks are becoming increasingly more targeted, with callers beginning to impersonate employees from companies that users have already entrusted with their computers’ protection.“During the past week or so, we have received some complaints and it appears that some of our customers are being targeted by a new scam,” said Adam Riley, head of third party suppliers at antivirus firm Avast Software, in a blog post on Tuesday. A small number of Avast customers have recently received unsolicited phone calls from people claiming to be Avast customer service representatives, who asked for money to fix problems identified on their computers, Riley said.However, Avast’s customers are not the only antivirus users targeted by tech support scammers. “I recently learned from my colleagues at ESET UK that cold-callers from Mumbai have developed a new twist on this cold-calling scam, calling people in the UK and apparently claiming to offer paid support in response to problems that don’t exist, because, they claim, ‘ESET doesn’t offer free support’,” said David Harley, a senior research fellow at antivirus vendor ESET, in a blog post. Harley has been tracking tech support scams for a long time and has recently observed the development of new tactics by the people behind them.In order to trick victims into believing that their computers have a problem, scammers commonly leverage the Windows Event Viewer, a legitimate Microsoft application that lists various errors and warnings logged on the system. Most of them are not of critical importance, but can appear worrisome to non-technical users.However, attackers have recently started to ask users to open the Run dialog box by pressing Win key + R and type commands like “prefetch hidden virus” or “inf trojan malware,” Harley said.The PREFETCH and INF commands open the C:WindowsPrefetch and C:WindowsInf folders respectively, which contain legitimate system files. However, less technical users might be inclined to think that these are malicious files revealed by the “hidden virus” or “trojan malware” command parameters.“In fact, neither of these commands accepts parameters in the Run box,” Harley said. “You could type ‘inf elvish fantasy’ or ‘prefetch me a gin and tonic’ and you’d get exactly the same directory listing, showing legitimate files.” Fortunately, antivirus companies almost never contact their customers by phone regarding technical support issues, so receiving unsolicited phone calls from people claiming to represent such companies is a good indication of a scam, Harley said. “I can’t guarantee that you won’t get marketing calls but they should be within acceptable legal and ethical boundaries, and that doesn’t include pretending to see malware on a system they don’t have access to.” Another sign that users are dealing with a scam is the caller’s intention to use free or trial versions of commercial remote desktop software. “If a professional AV company needs access to your machine, they won’t do it by misusing free licences for another company’s software,” Harley said. Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe