December 3, 2015 By Jaikumar Vijayan 2 min read

In a troubling new development, some tech support scammers may have begun using ransomware tools to increase their chances of extracting money from victims.

A Massive Problem

Tech support scams typically involve criminals trying to convince people to buy bogus products for addressing security problems that do not really exist on their computers. Sometimes the scammers call victims and scare them into believing they have a serious problem on their computers. In other cases, they serve up an incessant barrage of pop-up messages on a victim’s computer that warn of scary but entirely fictitious security issues with their computers.

Victims are often lured into calling a toll-free number where the scammers try to persuade them into purchasing and installing phony software or they are sent to malicious websites to download an unneeded remedy for their purported problem. Tens of thousands of Internet users have been targeted with such tech support scams over the years, prompting the Federal Trade Commission and others to issue alerts warning consumers about the issue.

Dangerous New Twist

In a dangerous new twist, security vendor Symantec recently reported seeing several instances in which websites offering phony technical support services have also begun serving up ransomware and data-stealing malware.

Symantec found that users arriving at phony tech support sites were being redirected to a server hosting an exploit kit dubbed Nuclear, which has been widely used to distribute ransomware and other sophisticated malware.

According to Symantec, the Nuclear exploit kit attempts to find vulnerabilities on the victim’s computer. If it discovers one, it drops either the Cryptowall ransomware Trojan or a data-stealing malware program called Miuref.B, Symantec security researcher Deepak Singh wrote in the blog post.

“The combination of the tech support scam displaying pop-up windows and the Nuclear exploit kit installing ransomware in the background makes this attack a serious problem for users,” Singh said.

Upping Their Game?

Ransomware is malware that cybercriminals use to encrypt the contents of a computer’s hard drive and then extort money from the victim in return for decrypting the data. By using such malware in combination with a tech support scam, threat actors could end up collecting money not just for addressing a phony security problem on a victim’s computer, but for also decrypting the data on it.

For the moment, it remains unclear whether it is actually the tech support scammers who have incorporated the use of ransomware in their criminal campaigns or someone else, Singh said.

Symantec has seen instances in the past where such groups have indeed dabbled with some basic ransomware. For example, there was an incident last year where researchers at Symantec uncovered a phony tech support operation using a Trojan dubbed Ransomlock to get people to call it for help. The malware locked a victim’s computer screen and displayed an error message instructing the user to call the company for help resolving the issue.

Given such instances, it would not be a major jump for a fake tech support operation to use a more sophisticated ransomware tool like Cryptowall, Singh noted.

More Ransomware Could Be on the Horizon

It is also quite possible that the websites of many support tech scammers have been compromised by a separate group of cybercriminals and rigged to direct users to sites serving up ransomware and other threats. “Either possibility can be supported by the fact that an iframe has been injected into the tech support scam page,” Singh wrote in his most recent blog post.

Either way, this is the first time that Symantec has seen the Nuclear exploit kit being used in conjunction with tech support scams. If the campaigns prove successful, expect to see more of them in the future.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today