{"id":119,"date":"2017-03-01T14:16:08","date_gmt":"2017-03-01T14:16:08","guid":{"rendered":"https:\/\/blog.gridinsoft.com\/?p=119"},"modified":"2024-07-04T14:58:09","modified_gmt":"2024-07-04T14:58:09","slug":"microsoft-tech-support-scam-affiliate-program","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/microsoft-tech-support-scam-affiliate-program\/","title":{"rendered":"Microsoft Tech Support Scam Affiliate Program"},"content":{"rendered":"<p>The Microsoft Tech Support Scam has recently gained popularity as a new sector of cyber attacks. Scammers, masquerading as Microsoft Technical Support, pressure internet users into calling a supposedly toll-free phone number. Contrary to their claims, this number incurs significant charges, enabling fraudsters to profit from each call made.<\/p>\n<p>Responding to numerous claims from our users about these <a href=\"https:\/\/gridinsoft.com\/blogs\/cyber-attacks\/\">cyber attacks<\/a>, we have conducted a detailed investigation into this fraudulent scheme. In this post, we will answer the most frequently asked questions about Microsoft Tech Support scammers. Being forewarned is being forearmed! We encourage you to stay vigilant to the signs and protect your safety while browsing. Do not allow scammers to exploit your fears!<\/p>\n<figure id=\"attachment_181\" aria-describedby=\"caption-attachment-181\" style=\"width: 966px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-181 size-full\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/mal-landing-page-2.png\" alt=\"Microsoft Tech Support scam\" width=\"966\" height=\"668\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/mal-landing-page-2.png 966w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/mal-landing-page-2-300x207.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/mal-landing-page-2-768x531.png 768w\" sizes=\"auto, (max-width: 966px) 100vw, 966px\" \/><figcaption id=\"caption-attachment-181\" class=\"wp-caption-text\">Tech Support Scam landing page example<\/figcaption><\/figure>\n<h2>How Do Scammers Intimidate People?<\/h2>\n<p>Hackers employ various tactics to intimidate their victims, aiming primarily to profit. Fraudulent landing pages can switch to full-screen mode, disable main keys, and prevent the context menu from opening. Scammers can easily execute these actions using the following JavaScript code:<\/p>\n<figure id=\"attachment_178\" aria-describedby=\"caption-attachment-178\" style=\"width: 945px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-178\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/toggle-fullscreenCode-2.jpg\" alt=\"Toggle the full-screen mode\" width=\"945\" height=\"343\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/toggle-fullscreenCode-2.jpg 945w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/toggle-fullscreenCode-2-300x109.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/toggle-fullscreenCode-2-768x279.jpg 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><figcaption id=\"caption-attachment-178\" class=\"wp-caption-text\">Toggle the full-screen mode<\/figcaption><\/figure>\n<figure id=\"attachment_126\" aria-describedby=\"caption-attachment-126\" style=\"width: 591px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-126\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/block-menu.jpg\" alt=\"context menu is blocked\" width=\"591\" height=\"443\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/block-menu.jpg 591w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/block-menu-300x225.jpg 300w\" sizes=\"auto, (max-width: 591px) 100vw, 591px\" \/><figcaption id=\"caption-attachment-126\" class=\"wp-caption-text\">Code using for menu blocking<\/figcaption><\/figure>\n<figure id=\"attachment_179\" aria-describedby=\"caption-attachment-179\" style=\"width: 890px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-179\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/block-keys-2.png\" alt=\"locked keys\" width=\"890\" height=\"328\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/block-keys-2.png 890w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/block-keys-2-300x111.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/block-keys-2-768x283.png 768w\" sizes=\"auto, (max-width: 890px) 100vw, 890px\" \/><figcaption id=\"caption-attachment-179\" class=\"wp-caption-text\">Locking the main keys<\/figcaption><\/figure>\n<p>Interestingly, fraudsters even integrate Google Analytics into their malicious web pages!<\/p>\n<figure id=\"attachment_133\" aria-describedby=\"caption-attachment-133\" style=\"width: 683px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-133\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/ga.jpg\" alt=\"scammers google analytics\" width=\"683\" height=\"125\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/ga.jpg 683w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/ga-300x55.jpg 300w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><figcaption id=\"caption-attachment-133\" class=\"wp-caption-text\">Google Analytics on scammers landings<\/figcaption><\/figure>\n<p>The horrible text messages are not the only thing which scammers are using to terrify their victims. There are also threatening voice notifications played. Usually, they are stored here:<\/p>\n<p>However, terrifying text messages are not the only tool scammers use to intimidate their victims. They also employ threatening voice notifications. Typically, these audio files, such as alert messages, are hosted at URLs like this:<\/p>\n<p><code>MALICIOUS_URL\/chrm\/alert2.mp3<\/code><\/p>\n<p>If you ever come across these scare tactics, remain calm and recognize that there is no real danger as long as you avoid calling the \u201cfree\u201d phone number provided by the fake technical support team.<\/p>\n<h2>Microsoft Tech Support Scam: Scam-as-a-Service<\/h2>\n<p>The landing pages that our users unfortunately encountered are just the tip of the iceberg. In the world of cybercrime, Malware-as-a-Service has flourished for a long time. These <a href=\"https:\/\/thehackernews.com\/2023\/12\/beware-scam-as-service-aiding.html\" rel=\"nofollow noopener\" target=\"_blank\">newer scam techniques<\/a> can aptly be termed Scam-as-a-Service.<\/p>\n<p>On a recently discovered semi-private Russian underground forum, <a href=\"https:\/\/gridinsoft.com\/online-virus-scanner\/url\/exploit-in\">exploit.in<\/a>, we came across a description of an affiliate program:<\/p>\n<figure id=\"attachment_185\" aria-describedby=\"caption-attachment-185\" style=\"width: 767px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-185\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/exploit-pp-1.png\" alt=\"scam support\" width=\"767\" height=\"439\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/exploit-pp-1.png 767w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/exploit-pp-1-300x172.png 300w\" sizes=\"auto, (max-width: 767px) 100vw, 767px\" \/><figcaption id=\"caption-attachment-185\" class=\"wp-caption-text\">Scam support affiliate program<\/figcaption><\/figure>\n<h3>English translation:<\/h3>\n<div class=\"su-note\"  style=\"border-color:#e1e1cc;border-radius:3px;-moz-border-radius:3px;-webkit-border-radius:3px;\"><div class=\"su-note-inner su-u-clearfix su-u-trim\" style=\"background-color:#fbfbe6;border-color:#ffffff;color:#333333;border-radius:3px;-moz-border-radius:3px;-webkit-border-radius:3px;\">\nThe private affiliate program of the tech support hires new publishers. Our landing page aggressively convinces people to call on your unique phone number (free), and you get a commission from each call. The standard rate is $ 4.5 per call. For the major partners with good quality and volume, the tariff is discussed individually.<\/em><\/p>\n<ul>\n<li>Always provide clean landings and domains.<\/li>\n<li>Accept all browsers for the Windows desktop.<\/li>\n<li>Accepted countries: US, CA<\/li>\n<li>All subjects are suitable, the main thing was that the traffic was alive.<\/li>\n<li>Handy admin panel with the instant statistics of calls and conversion.<\/li>\n<li>The ability to make multiple streams and their conversion\u2019s comparison.<\/li>\n<\/ul>\n<p>Conversion, as elsewhere, depends on the traffic\u2019s quality. If the quality is good, the popunder and the redirect bring from 2 to 5 calls from 1k unique visitors. The search and scrap bring up to 30 calls from the 1k unique visitors, depending on the subject and the audience. You\u2019ll get your payments every day or O\/R &#8211; BTC. The usual working time is from 19:00 to 02:00. But, it\u2019s highly recommended to ask the support if it has changed each time before delivering the traffic.<\/p>\n<\/div><\/div>\n<p>As you can see from the description, the scheme is quite straightforward: the creators of the affiliate program provide publishers with domains, admin panels with statistics, and payments through BTC, which has become the standard currency in the cyber underworld. Publishers simply need to direct traffic to these affiliate domains and then wait for their profits.<\/p>\n<h2>Could Google Eliminate Microsoft Tech Support Scam Fraud?<\/h2>\n<p>Google can effectively mitigate such aggressive scams by adding fraudulent landing pages to its Google Safe Browsing filters. However, scammers are relentless. They frequently register a large number of similar domains with names that subtly reference <strong>Microsoft<\/strong> to perpetuate their schemes:<\/p>\n<figure id=\"attachment_161\" aria-describedby=\"caption-attachment-161\" style=\"width: 1160px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-161\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/domain-list.png\" alt=\"Popular malicious domain names\" width=\"1160\" height=\"743\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/domain-list.png 1160w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/domain-list-300x192.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/domain-list-1024x656.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/domain-list-768x492.png 768w\" sizes=\"auto, (max-width: 1160px) 100vw, 1160px\" \/><figcaption id=\"caption-attachment-161\" class=\"wp-caption-text\">Scam domain list<\/figcaption><\/figure>\n<p>It is important to remember that the lifespan of individual scam pages is usually very short. They should not cause undue alarm.<\/p>\n<h2>What Happens to Those Who Made the Call?<\/h2>\n<p>All scam pages involved in this scheme share the same phone number: <strong>+1-844-713-3460<\/strong>. We have collected typical user complaints about this number:<\/p>\n<blockquote>\n<p>A message popped up on my computer: &#8220;Microsoft-error4113.xyz says: *** YOUR COMPUTER HAS BEEN BLOCKED ***&#8221; and it warned that personal information was being stolen, including my photos. It threatened to disable my computer within five minutes and provided this number to call. This is a SCAM! The signs include Microsoft spelled in lowercase, an error code that doesn&#8217;t align with legitimate ones, and the overt threat. When I researched this number on another reporting site, I found a person who mentioned that his mother had made the mistake of calling and allowing them remote access to her computer\u2014they changed her passwords and hijacked it, demanding money to release it! BAD MOJO!!!<\/p>\n<\/blockquote>\n<blockquote>\n<p>While using my computer, this number appeared with a message saying, &#8220;Critical Alert from Microsoft.&#8221; I called the number back, and the person on the line wanted access to my computer to &#8216;fix&#8217; the problem, threatening to shut down my computer if I did not comply. We denied access. The error message linked to this number was Microsoft error 3111.xyz.<\/p>\n<\/blockquote>\n<p>As the complaints suggest, the scammers&#8217; objective is to coerce victims into granting them full access to their computers for further intimidation. You should never allow access to your system to anyone you don&#8217;t know, especially if they are performing these questionable activities independently.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"Microsoft Tech Support Scam Affiliate Program\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n<h3>Conclusion<\/h3>\n<p>The <strong>Microsoft Tech Support Scam<\/strong> is a new, widespread scheme in the cybercrime world. Scammers capitalize on users&#8217; fears by employing simple scare tactics, typically involving disabled keys, full-screen modes, and alarming audio messages. We hope this information convinces you to not give in to such threats. Such deceptive and rudimentary schemes do not deserve your attention or financial support!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft Tech Support Scam has recently gained popularity as a new sector of cyber attacks. Scammers, masquerading as Microsoft Technical Support, pressure internet users into calling a supposedly toll-free phone number. Contrary to their claims, this number incurs significant charges, enabling fraudsters to profit from each call made. Responding to numerous claims from our [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17],"tags":[94,61],"class_list":{"0":"post-119","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"tag-microsoft","9":"tag-scammers"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2017\/02\/Main.png","author_info":{"display_name":"Vladislav Baglay","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/baglay\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":11,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/119\/revisions"}],"predecessor-version":[{"id":25530,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/119\/revisions\/25530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/209"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}