December 3, 2015 By Jaikumar Vijayan 2 min read

In a troubling new development, some tech support scammers may have begun using ransomware tools to increase their chances of extracting money from victims.

A Massive Problem

Tech support scams typically involve criminals trying to convince people to buy bogus products for addressing security problems that do not really exist on their computers. Sometimes the scammers call victims and scare them into believing they have a serious problem on their computers. In other cases, they serve up an incessant barrage of pop-up messages on a victim’s computer that warn of scary but entirely fictitious security issues with their computers.

Victims are often lured into calling a toll-free number where the scammers try to persuade them into purchasing and installing phony software or they are sent to malicious websites to download an unneeded remedy for their purported problem. Tens of thousands of Internet users have been targeted with such tech support scams over the years, prompting the Federal Trade Commission and others to issue alerts warning consumers about the issue.

Dangerous New Twist

In a dangerous new twist, security vendor Symantec recently reported seeing several instances in which websites offering phony technical support services have also begun serving up ransomware and data-stealing malware.

Symantec found that users arriving at phony tech support sites were being redirected to a server hosting an exploit kit dubbed Nuclear, which has been widely used to distribute ransomware and other sophisticated malware.

According to Symantec, the Nuclear exploit kit attempts to find vulnerabilities on the victim’s computer. If it discovers one, it drops either the Cryptowall ransomware Trojan or a data-stealing malware program called Miuref.B, Symantec security researcher Deepak Singh wrote in the blog post.

“The combination of the tech support scam displaying pop-up windows and the Nuclear exploit kit installing ransomware in the background makes this attack a serious problem for users,” Singh said.

Upping Their Game?

Ransomware is malware that cybercriminals use to encrypt the contents of a computer’s hard drive and then extort money from the victim in return for decrypting the data. By using such malware in combination with a tech support scam, threat actors could end up collecting money not just for addressing a phony security problem on a victim’s computer, but for also decrypting the data on it.

For the moment, it remains unclear whether it is actually the tech support scammers who have incorporated the use of ransomware in their criminal campaigns or someone else, Singh said.

Symantec has seen instances in the past where such groups have indeed dabbled with some basic ransomware. For example, there was an incident last year where researchers at Symantec uncovered a phony tech support operation using a Trojan dubbed Ransomlock to get people to call it for help. The malware locked a victim’s computer screen and displayed an error message instructing the user to call the company for help resolving the issue.

Given such instances, it would not be a major jump for a fake tech support operation to use a more sophisticated ransomware tool like Cryptowall, Singh noted.

More Ransomware Could Be on the Horizon

It is also quite possible that the websites of many support tech scammers have been compromised by a separate group of cybercriminals and rigged to direct users to sites serving up ransomware and other threats. “Either possibility can be supported by the fact that an iframe has been injected into the tech support scam page,” Singh wrote in his most recent blog post.

Either way, this is the first time that Symantec has seen the Nuclear exploit kit being used in conjunction with tech support scams. If the campaigns prove successful, expect to see more of them in the future.

More from

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today