Scammers pretending to be from BT

Scammers pretending to be from BT

Beware scammers pretending to be BT ….or anyone else for that matter.

These crooks are getting very creative. We recently had to report a case to Actionfraud, some spoof email had tried to prise some money from a clients account, it did not work! Anyway speaking to the call attendant , she mentioned they currently have an unprecedented amount of fraud cases. In the words of this weary attendant “no longer suprised at the depths these people go to and nothing suprises” her anymore!

Our client had a few calls from some scammers today and the number showing on their display  was +4576521. The calls were made from people claiming they are from BT and wanting to log on to the server to rectify the issue with their slow internet – In their words “we have no issue with our internet, we have received 2 phone calls this morning and are now ignoring the calls”.

Ransomware known as WannaCry, Wanna, or Wcry went on a global cyber infection rampage on Friday, infecting at least 200,000 computers in over 100 countries. The malware adapted to a multi-lingual platform has caused complete data paralysis at banks, hospitals and telecommunications service providers, most notably in the UK, Spain, and Germany.

Importantly making sure windows patches are up to date, backups work and educating your users will help us keep your network safe.

In simple terms, although this ransomware is currently causing havoc across the globe, the ransomware itself is similar to what we have seen before.  It’s the advanced delivery mechanism that has unfortunately caught many organisations off guard.

In addition to deploying Antivirus as part of a strong endpoint control strategy, it is essential you help to continue to keep your systems up-to-date on the latest software versions, and invest in user education on the dangers of phishing, ransomware, social engineering and other common attack vectors.

What do you need to do now?

#1 Make your staff aware and cautious!

Just as with many other ransomware, the virus can penetrate the system not only through a Windows vulnerability, but also through the “spray-‘n’-pray” phishing attack, which involves spamming users with emails that carry a malicious attachment. The attackers can also lure a victim to click on a URL where malware will be ready to crawl into your machine. Tell your users to be vigilant. Don’t click on random or suspicious items.

#2 Patch!

In general, we run automated software to enable patching on your system and installing regular Microsoft updates. We are scanning all systems to ensure you are up to date. We advise doing the same for any machines brought in from outside and even systems at home. Ensure you have up to date virus definitions, run Microsoft patches and formulate your own backup strategy. If unsure, please contact us.

#3 Backup!

It is highly advised, in order to protect yourself from being held hostage to data thieves, to create secure backups of important data on a regular basis. Simply backing up is not enough though, as physically disconnecting the storage device is required to avoid it being infected with ransomware as well. For peace of mind the current backup is encrypted and sent offsite

With the current wave of cyber scams and tricks please be vigilent. If you suspect something then do not proceed. If you need advise do give us a call.

For definate fraud incidents please check out:

http://www.actionfraud.police.uk/report_fraud

 

Please Subscribe To Our Newsletter

We would love you to join us on our mailing list to receive the latest IT news and updates.

Everything on Cloud technology in the UK to handy software and user guides.

You have Successfully Subscribed!