Contact Us! 469-272-0777

LiveZilla Live Help

AspireTech Blog

AspireTech has been serving the Mansfield area since 1999 , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Windows 10 Email Scam Isn’t The Upgrade You’re Looking For

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor those of you who don’t yet have Windows 10, don’t panic. It’s not going anywhere, and you’ll get it soon enough. In the meantime, it’s important that you don’t get impatient and hastily open suspicious emails containing what appears to be a launcher for your Windows 10 download. Hackers are using ransomware to extort money from unsuspecting users who just want their new operating system already.

For some, the fault might lie with Microsoft because of the way they’ve decided to deploy Windows 10. Making people wait even more for a product that already exists is somewhat maddening, and hackers are taking advantage of this impatience to strike. CTB-Locker is a ransomware similar to Cryptolocker, in which it encrypts information locally on your PC, and offers a decryption key in exchange for a hefty price.

This ransomware spreads via email. Victims will receive a message in their inbox which appears to be from Microsoft detailing how they can bypass the wait for Windows 10, and prompts them to download what appears to be a launcher for the new operating system. Once the user downloads the executable file, the malware starts encrypting data on the PC. The user is locked out of their PC until they pay the ransom.

Furthermore, if the user wants to regain access to their files, the ransom must be paid in Bitcoin, a cryptocurrency which is known for its anonymity and difficulty to trace. Adding to the difficulty is that the hackers are using the Tor anonymity network to communicate, which makes catching the clowns behind this act difficult at best. Ransomware is an increasingly popular problem, and according to ZDNet, it can cost users anywhere from $200 to $10,000 for each occurrence, leading to ultimate costs of up to $18 million. That’s a lot of cash that’s been extorted from some 1,000 users in 2015 alone.


Of course, with a good email solution you won’t be receiving this message. A powerful spam blocking solution is capable of keeping spam messages out of your inbox almost indefinitely, meaning that you have little to worry about from the average phishing attack. Still, if a hacker wants to scam you bad enough, they’ll find a way to get through your security measures and attack you directly, in the form of a targeted spear phishing attack.

Therefore, the best way you can protect yourself from threats like CTB-Locker is to keep an eye on your inbox for any suspicious messages, and to never, ever, download attachments from unknown senders. Augment caution with a powerful spam filter and you’ll have all you need to keep phishing attacks at bay. Give AspireTech a call at 469-272-0777 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 09 August 2020
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!


Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Network Security Hosted Solutions Privacy Productivity Hackers Email Innovation Efficiency Malware Backup Internet Mobile Devices Data VoIP Google Data Backup Business Workplace Tips Microsoft Data Recovery Hardware IT Services IT Support communications User Tips Software Disaster Recovery Outsourced IT Managed IT Services Business Continuity Cybersecurity Smartphones Phishing Communication Productivity Computer Internet of Things Small Business Cloud Computing Collaboration Upgrade Network Android Saving Money Miscellaneous Managed IT Services Server Browser Smartphone Gadgets Business Management Mobile Device Tech Term BDR Windows Ransomware Windows 10 Automation IT Support Save Money Artificial Intelligence Chrome Social Media Cybercrime Users Quick Tips Office Passwords Windows 10 Mobility Microsoft Office Facebook Virtualization BYOD Holiday Bandwidth Computers Managed Service Spam Telephone Systems Encryption Employer-Employee Relationship Managed IT Mobile Device Management Information Networking Social Engineering Training Windows 7 Office 365 Operating System Recovery Data Security Avoiding Downtime Information Technology Managed Service Provider Blockchain Mobile Office Remote Monitoring Wi-Fi Two-factor Authentication Compliance Data Breach Firewall Wireless History Router Mobile Computing How To Remote Work Applications Word Data Protection Servers App Paperless Office Government Gmail VPN Business Technology Software as a Service Vendor Management Settings Proactive IT Redundancy Website Big Data Human Resources Application Apps Telephone System Private Cloud Help Desk Mouse Patch Management Data Storage Hacking Health Alert Business Intelligence Money Meetings Budget Access Control Display Infrastructure IT Management Risk Management Google Drive Analysis Document Management Office Tips Biometrics Lithium-ion battery Employee/Employer Relationship Connectivity Sports WiFi File Sharing Marketing HIPAA Law Enforcement Hacker The Internet of Things Machine Learning Education Manufacturing Voice over Internet Protocol Identity Theft Managed Services Provider Apple Downtime Data Management Staff Vulnerability Remote Computing Bring Your Own Device Virtual Private Network User Error Business Owner Hard Drives Regulations Workers Going Green Cryptocurrency Botnet Comparison IT Plan Internet Exlporer Save Time DDoS Unsupported Software Public Cloud Augmented Reality Robot Work/Life Balance OneNote Safety Retail USB Healthcare Telephony Keyboard Data loss SaaS Digital Signage CES Virtual Assistant Update Smart Tech Humor YouTube GDPR Black Market Saving Time Fax Server Cables Google Docs Procurement Content Management Spam Blocking Covid-19 Content Filtering HaaS Environment Solid State Drive Network Congestion Wireless Technology Credit Cards Cleaning Printers eWaste Data storage Professional Services Running Cable Scam Streaming Media IT solutions Virtual Reality Processor Fraud Value Windows Server 2008 Vendor Audit Entertainment Project Management Hard Drive Social Shadow IT Password Policy Wearable Technology Monitor Remote Workers NIST Best Available Strategy Computer Fan Authentication Internet exploMicrosoft Restore Data Social Network Line of Business Cabling User Entrepreneur Warranty Azure Amazon Web Services Wire Legal AI Procedure Security Cameras Managed IT Service Excel Maintenance Password Manager FENG Nanotechnology Advertising Backup and Disaster Recovery Printing Memory MSP Default App Managing Stress Printer RMM Social Networking Online Shopping Smart Office Current Events Contracts Laptop FinTech Relocation Business Analytics Business Mangement Safe Mode Travel Accountants Specifications Electronic Medical Records Notifications Cryptomining Personal Proactive Maintenance SharePoint Touchpad Administrator Smart Devices Evernote Knowledge Flash Emails Remote Distributed Denial of Service Smartwatch Using Data Shortcut Recycling Millennials Devices Software Tips PDF Business Cost Remote Worker Remote Maintenance Bluetooth Microchip Virtual Machine Customer Relationship Management Wireless Charging Students IT Consultant Sync Instant Messaging Webinar Video Conferencing Root Cause Analysis Employee Window 10 Criminal Database IoT Programming Workforce Thought Leadership Physical Security Best Practice Digitize Wiring IT Infrastructure Antivirus Search Engine Hypervisor Customer Service Fiber-Optic Leadership IT solutions Supply Chain Management iPhone Operations Distribution Telecommuting Content Filter Charger IT Assessment IT service Investment Bing Electronic Health Records Skype Managed Services Hosted Solution Screen Mirroring IaaS Files Google Search Projects Science Logistics Analyitcs Insurance Storage Unified Threat Management HBO OneDrive Domains NarrowBand E-Commerce ROI Unified Communications webinar Start Menu Cast Colocation Net Neutrality Computing Windows 8 Practices Twitter Computer Care Frequently Asked Questions Uninterrupted Power Supply Copiers Camera Shortcuts Employee/Employer Relationships Theft HVAC Conferencing Mobile Windows 10s Peripheral Computing Infrastructure ISP Fiber Optics Tablet Biometric Security WIndows 7 Multi-Factor Security Hosted Computing Addiction Samsung Tip of the week Development Chromecast Windows Server 2008 R2 Quick Tip eCommerce Bitcoin Virtual Desktop Cortana Enterprise Content Management File Versioning Trend Micro Proactive 5G Trending Inventory Cache Tech Support Messaging PCI DSS Outlook Batteries Google Apps Password Management Consultant Tools Digital Signature Transportation Data Warehousing End of Support Multiple Versions Shopping Tablets Remote Monitoring and Maintenance OLED Bloatware Lifestyle Amazon Wireless Internet SMS