After seven long years, the tech support scam continues as a reigning rip-off, generating more reports nationwide to the AARP Fraud Watch Network Helpline (877-908-3360) than any scheme except the IRS impostor ruse. Microsoft estimates that another 3.3 million Americans will fall victim in 2015, losing an estimated $1.5 billion to fraudsters posing as its or other tech company employees. The typical scenario is scary enough: Callers (sometimes from overseas boiler rooms) claim that your computer is infected with a dangerous …
Published: December 5, 2012
In the past year, hundreds of thousands of people across the world have switched on their computers to find distressing messages alerting them that they no longer have access to their PCs or any of the files on them.
The messages claim to be from the Federal Bureau of Investigation, some 20 other law enforcement agencies across the globe or, most recently, Anonymous, a shadowy group of hackers. The computer users are told that the only way to get their machines back is to pay a steep fine.
And, curiously, it’s working. The scheme is making more than $5 million a year, according to computer security experts who are tracking them.
The scourge dates to 2009 in Eastern Europe. Three years later, with business bo
oming, the perpetrators have moved west. Security experts say that there are now more than 16 gangs of sophisticated criminals extorting millions from victims across Europe.
The threat, known as ransomware, recently hit the United States. Some gangs have abandoned previously lucrative schemes, like fake antivirus scams and banking trojans, to focus on ransomware full time.
Essentially online extortion, ransomware involves infecting a user’s computer with a virus that locks it. The attackers demand money before the computer will be unlocked, but once the money is paid, they rarely unlock it.
In the vast majority of cases, victims do not regain access to their computer unless they hire a computer technician to remove the virus manually. And even then, they risk losing all files and data because the best way to remove the virus is to wipe the computer clean.
It may be hard to fathom why anyone would agree to fork over hundreds of dollars to a demanding stranger, but security researchers estimate that 2.9 percent of compromised computer owners take the bait and pay. That, they say, is an extremely conservative estimate. In some countries, the payout rate has been as high as 15 percent.
That people do fall for it is a testament to criminals’ increasingly targeted and inventive methods. Early variations of ransomware locked computers, displayed images of pornography and, in Russian, demanded a fee — often more than $400 — to have it removed. Current variants are more targeted and toy with victims’ consciences.
Researchers say criminals now use victims’ Internet addresses to customize ransom notes in their native tongue. Instead of pornographic images, criminals flash messages from local law enforcement agencies accusing them of visiting illegal pornography, gambling or piracy sites and demand they pay a fine to unlock their computer.
Victims in the United States see messages in English purporting to be from the F.B.I. or Justice Department. In the Netherlands, people get a similar message, in Dutch, from the local police. (Some Irish variations even demand money in Gaelic.) The latest variants speak to victims through recorded audio messages that tell users that if they do not pay within 48 hours, they will face criminal charges. Some even show footage from a computer’s webcam to give the illusion that law enforcement is watching.
The messages often demand that victims buy a preloaded debit card that can be purchased at a local drugstore — and enter the PIN. That way it’s impossible for victims to cancel the transaction once it becomes clear that criminals have no intention of unlocking their PC.
The hunt is on to find these gangs. Researchers at Symantec said they had identified 16 ransomware gangs. They tracked one gang that tried to infect more than 500,000 PCs over an 18-day period. But even if researchers can track their Internet addresses, catching and convicting those responsible can be difficult. It requires cooperation among global law enforcement, and such criminals are skilled at destroying evidence.
Charlie Hurel, an independent security researcher based in France, was able to hack into one group’s computers to discover just how gullible their victims could be. On one day last month, the criminals’ accounting showed that they were able to infect 18,941 computers, 93 percent of all attempts. Of those who received a ransom message that day, 15 percent paid. In most cases, Mr. Hurel said, hackers demanded 100 euros, making their haul for one day’s work more than $400,000.
That is significantly more than hackers were making from fake antivirus schemes a few years ago, when so-called “scareware” was at its peak and criminals could make as much as $158,000 in one week.
Scareware dropped significantly last year after a global clampdown by law enforcement and private security researchers. Internecine war between scareware gangs put the final nail in the coffin. As Russian criminal networks started fighting for a smaller share of profits, they tried to take each other out with denial of service attacks.
Now, security researchers are finding that some of the same criminals who closed down scareware operations as recently as a year ago are back deploying ransomware.
“Things went quiet,” said Eric Chien, a researcher at Symantec who has been tracking ransomware scams. “Now we are seeing a sudden ramp-up of ransomware using similar methods.”
Victims become infected in many ways. In most cases, people visit compromised Web sites that download the program to their machines without so much as a click. Criminals have a penchant for infecting pornography sites because it makes their law enforcement threats more credible and because embarrassing people who were looking at pornography makes them more likely to pay. Symantec’s researchers say there is also evidence that they are paying advertisers on sex-based sites to feature malicious links that download ransomware onto victims’ machines.
“As opposed to fooling you, criminals are now bullying users into paying them by pretending the cops are banging down their doors,” said Kevin Haley, Symantec’s director of security response.
More recently, researchers at Sophos, a British computer security company, noted that thousands of people were getting ransomware through sites hosted by GoDaddy, the popular Web services company that manages some 50 million domain names and hosts about five million Web sites on its servers.
Sophos said hackers were breaking into GoDaddy users’ accounts with stolen passwords and setting up what is known as a subdomain. So instead of, say, www.nameofsite.com, hackers would set up the Web address nameofsite.blog.com, then send e-mails to customers with the link to the subdomain which — because it appeared to come from a trusted source — was more likely to lure clicks.
Scott Gerlach, GoDaddy’s director of information security operations, said it appeared the accounts had been compromised because account owners independently clicked on a malicious link or were compromised by a computer virus that stole password credentials. He advised users to enable GoDaddy’s two-step authentication option, which sends a second password to users’ cellphones every time they try to log in, preventing criminals from cracking their account with one stolen password and alerting users when they try.
One of the scarier things about ransomware is that criminals can use victims’ machines however they like. While the computer is locked, the criminals can steal passwords and even get into the victims’ online bank accounts.
Security experts warn to never pay the ransom. A number of vendors offer solutions for unlocking machines without paying the ransom, including Symantec, Sophos and F-Secure. The best solution is to visit a local repair shop to wipe the machine clean and reinstall backup files and software.
“This is the new Nigerian e-mail scam,” Mr. Haley said. “We’ll be talking about this for the next two years.”
First, the basics
Most laptops use batteries that can last for 3-5 years, or about 1000 charges. (A premium laptop’s battery might last longer.) Every time you charge your battery, the total capacity of the battery is diminished. Originally it may have had a run time of 3.5 hours, but after a year it’ll run out of juice at 3 hours, even on a full charge.
If your battery capacity has diminished, there are a few things you can do about it. First, you have to correctly gauge how much capacity has been lost. There are free downloads to do this job, like Battery Bar (for Windows PCs) or Coconut Battery (for Macs). These will compare your battery’s current maximum capacity to how long it lasted when it was new.
(UPDATE- we originally recommended Battery Eater and while the program works great, their download site has been compromised and we are recommending an alternate program, Battery Bar downloadable from CNET.)
Calibrating your Battery
You can’t miraculously reconstitute your battery’s capacity. It loses power over time due to chemical reactions taking place in the battery, as it chugs along powering your laptop. You can’t undo those changes, but there is one common battery issue you can fix: In many laptops, the operating system’s battery meter gets out of sync with how much juice the battery actually has.
Imagine if the gas gauge on your car dashboard was misreading how much gas you actually had in the tank. You’d either run out of gas when you thought you had a quarter of a tank left, or you’d be filling up too frequently. In your laptop, this can mean your laptop shuts down abruptly when the meter says you have 30 minutes left. Or else the meter might warn that you only have 2 minutes of battery life left and shut your laptop down, when it really has another 20 minutes remaining.
Recalibrating gets the battery meter to correctly read the current state of the battery, so you and the operating system know where you stand with existing battery life.
How to recalibrate
First, charge your laptop’s battery to full, and leave it that way for at least two hours. Then unplug your laptop, and set its power management settings to never turn off or lower the monitor brightness. (HP has instructions for how do to this on Windows 7 and Vista, as well as Windows XP, while Apple has instructions for Mac laptops on their site.)
You want to drain the battery completely, then let your laptop sit for at least five hours this way — like, say, overnight. (Just be careful and mute the volume, since some laptops make a warning sound when they’re about to run out.) Afterwards, charge it up again, and you should notice a more accurate portrayal of your battery capacity. In some cases, you may even get more life out of it.
Best practices to maintain battery life
You’d think that the best way to keep your laptop’s battery from wearing out is to not use it. Right?
As it turns out, batteries are like muscles; they need to be worked out regularly to stay healthy. Ideally, you’d use your laptop unplugged at least once a day, like on a train or bus commute or on the couch in front of the TV. If you’re not going to use it, constantly charging your battery is a bad idea; HP recommends on their website that if you’re going to leave your laptop plugged in or put up in storage for more than two weeks, you should take the battery out of your laptop.
Past the expiration date
So when is it time to throw out that old battery? The answer, surprisingly, is “never.” Laptop batteries contain lots of toxic chemicals, and should never end up in landfills. Fortunately, e-stewards.org has a list of environmentally responsible recyclers that will take your old battery with no fuss.
When is it time to replace your battery, then? Use the free utility apps Becky mentioned, and when they say that your battery can only hold around 25% of its original capacity it’s probably time for a new one. You can buy a replacement battery from the original laptop manufacturer, and there are plenty of places online that sell discounted PC laptop batteries, like Laptops for Less and Batteries.com. Owners of newer Mac laptops can get their laptop’s non-removable battery swapped out at any Apple store, with a scheduled appointment.
A recent analysis by a PC Repair Firm indicated that almost 50% of their customers use passwords such as “password” or “123456” for email, and a variety of sites that store their personal data, credit card information, etc.
Many website operators have been restricting the use of “generic passwords” for new subscribers, but the problem still persists for existing users/subscribers. Many website operators are encouraging the use of 12 alpha/numeric passwords for enrollees and customers.
Passwords with 4-6 characters can be hacked on average within 3-6 hours with readily available password hacking software. A 12 character password consisting of both alpha/numeric characters on average will take 170 YEARS!
Is your password “hackable”? If you use less than 8 alpha/numeric characters, 12 is recommended by most experts, then you are leaving yourself vulnerable!
Lost/forgot your windows logon password?…….Hold down the f8 key while booting your PC, and start it in safe mode. After it boots, click on the “Administrator” logon/icon, and after you get to the desktop do the following:
Go to Control Panel
Click on Users
Click on your User Profile (or the one you do not have the password for)
Select Change Password
Enter enter a new password, or leave the boxes blank for no password
Restart the PC
When prompted click on the user, enter the new password, or just wait for it to boot into the desktop if no password is needed.
Now if that does not work -THEN call PC Experts!