[
Update 30th October 2013: with regard to the ping gambit discussed below, please note that protection.com now responds to ICMP echo requests - in other words, if you now run the command "ping protection.com" you should now see a screen something like this:
Note that this is perfectly normal behaviour for a site that responds to ping requests. It's probable that protection.com
is now doing so because its owners have no wish, understandably, to
have their site associated with support scammer misuse, having been
notified by Malwarebytes that the abuse was taking place. However, the ping
interface is rather minimal, and might still be confusing enough for a
computer user with little knowledge of network to encourage a scammer to
try to persuade the victim that these messages somehow prove that his
system is infected. It doesn't, of course: as explained below, to ping the protection.com tells you nothing whatever about the protection status of your computer.
If you have no idea what I'm talking about, read on, or skip to
the 'Mac Attack' section of the article. (Hat tip to Les Bell of
Macquarie University, Sydney, for drawing this development to my
attention.]
If you regularly read this blog (come to think of it, even if you don’t…), you will probably be familiar with the
tech support scams I’ve
written
about here so often. If not, I’m referring to the unsolicited phone
calls telling you that your computer has a problem of some sort (perhaps
a mysterious virus, corrupted files or disk partitions, or attacks by a
remote hacker) that the caller will be pleased to fix for you, for a
“small” fee.
This is, however, an area of cybercrime I haven’t looked at lately on
this blog: partly because I’ve been getting far fewer of them myself.
(Maybe they’ve got tired of my asking them awkward questions and calling
them names when the entertainment value has worn thin.) That doesn’t
mean they’ve gone away, of course, and it’s about time I brought you up
to date with some of the recent tricks I’ve seen and heard reported.
Some relate to the type of ‘problem’ the scammer claims has affected
your system, some relate to the ongoing development of new ways of
misusing system utilities and legitimate software in order to ‘prove’
that (a) the scammer is really able to identify your system (b) there
really is something wrong on that system. And finally, there’s some
information on a trick that has been reported as targeting Mac users,
but could also be used against PC users.
Our previous blogs on the topic still attract lots of comments, and
very interesting and useful they are too. Some of them tell us a lot
about the type of social engineering that the scammers are using to
‘soften up’ the intended victim. One commenter was told:
…there have been complaints from my IP
address about scam emails sent to the government, that there have been
mentions of bombs and terrorism in my messages, and he asked me if I was
one of them. Then he said that lots of porn has been downloaded from my
PC if I was downloading it or not!
The same comment also describes how the scammer asked:
…if I thought it was a joke that he had
my phone number … and he had my address … and of course that the called
was being recorded.
I love it when a scammer gets irritated and self-righteous because he
doesn’t think you’re taking him seriously enough. However, it’s
probably
not a good idea to annoy him if and while he has remote access to your computer.
There are several gambits here worth noting.
Dial Tone
One is the use of the threat of government or law enforcement
interest and action, based on the supposition that the victim has
engaged in fraudulent or terrorist activity, or even sharing
pornographic material. This kind of threat is commonly associated with
malware and especially
ransomware,
and seems increasingly associated with support scamming. At any rate,
I’ve heard several reports recently of incidents where the scammer has
persuaded the victim to allow him access to his machine and taken
advantage of the access to install ransomware – or some other type of
malware – and then required payment for its removal.
Another is the assertion that ‘knowing’ the victim’s telephone number
and address somehow proves the scammer’s claims. In fact, we know that
cold-call scammers use a variety of techniques for finding their
victims. Sometimes they use automated or semi-automated predictive call
dialers (diallers for those of us in the UK…): that is, hardware or
dialing software that simply works through a sequence of numbers. This
approach is often used by cold-callers to play a recorded message when
the call is answered.
(Readers in the UK will probably be all too familiar with automated
messages urging them to claim back money they’re owed by Payment
Protection Insurance companies – these aren’t all unequivocal scams, but
should certainly be taken with a pinch or three of salt, and I may come
back to that particular issue in another blog.)
However In support scams (as well as in other scams and even in more
legitimate telemarketing operations), the dialer normally connects the
call recipient to a live agent when the call is answered. Legitimate
telemarketers should (but often don’t) avoid numbers that are on a local
do-not-call registry like the US
National Do Not Call database, Canada’s
National Do Not Call List or the UK’s Telephone Preference Service. Scammers, however, usually have no such qualms.
The disadvantage of the automated dialing method is that they don’t
necessarily have personalized information relating to a specific number.
However, support scammers are as capable as anyone else of looking up
names and addresses in on-line directories and less legitimate sources.
(Unfortunately, having an unlisted telephone number isn’t a guarantee
that someone won’t sell it on.)
None of this proves in the least that:
- The scammer is who he says he is, or represents Microsoft or any
other company he claims to be working for or with, or the police, or the
FBI, the NSA or even the BBC. ;-)
- That Microsoft or anyone else has given him information about your
system, your IP address, or anything else that’s supposed to show that
your system is insecure or ailing.
The threat that the phone call is being recorded is just that:
bullying and fearmongering. If anyone seriously suspects you of
wrongdoing, you’re still more likely to get a knock on the door than a
phone call (or email) that might be from anyone at all. For example,
another commenter tells us that he was told that his PC was being used
as a slave to download music, presumably illegally. A scammer might also
accuse a potential victim of other kinds of copyright infringement,
theft of intellectual property, and all kinds of other criminal
activity. Don’t let them panic you into parting with credit card
information for fear of being wrongfully accused. If it comes to that,
don’t let them panic you in other ways, such as telling you that your
town or even your country is being buried under an avalanche of malware
that anti-virus doesn’t detect but which they can somehow fix.
CLSID still isn’t a unique identifier for your PC
Another commenter told us that he received a call from someone
claiming to be Microsoft Support. The victim was told that his computer
would not receive Windows updates because of infection. He was convinced
by the CLSID gambit that the scammer really knew of a problem with his
system, not realizing at that time that CLSID does not uniquely identify
a Windows PC (see
Support desk scams: CLSID not unique
for more details), so he allowed the scammer to access his PC remotely.
(AMMYY, LogMeIn and Team Viewer are legitimate remote access programs
commonly misused by support scammers for this purpose.)
When I questioned how they could tell my
computer was infected, he directed me to do something. A window showed
several IP addresses (all my computer) and another number next to each
IP address that looked like MAC addresses, but I am not certain. The
next column had a label of some sort that I can’t remember, but it
seemed to indicate that each was a foreign or infected file.
My colleague
Aryeh Goretsky suggests that the utility misused in this case was the Windows
netstat
utility, though we’re not sure exactly what version or combination of
parameters might have been used. Aryeh points out that the values the
commenter suggests are MAC addresses might be IPv6 addresses, which are
displayed in hexadecimal notation. Here’s an example:
[fe80::841c:83ff:993f:cf0e%13]:445
This screenshot shows the Windows 8.0 version used with the
–n
parameter, which displays addresses and port numbers numerically. Of
course, ‘Foreign Address’ doesn’t mean infected, but non-local.
(Click on any of the images below if you want a closer view.)

And this screenshot shows the default display (again, in Windows 8.0),

The command ‘
netstat -?‘ will display the options available on your particular system at the command line.
Another commenter told us that he’d been told to ‘press Windows R’ (i.e. bring up the Run command) and then type ‘
inf location virus’ into the dialog box. Fortunately, this commenter knew that the
inf
command – strictly speaking, a search term – simply shows the contents
of a folder normally named C:\Windows\Inf, which contains files used in
installing the system.
Inf doesn’t recognize – and in fact simply ignores – any parameters even if they’re as sinister-sounding as ‘virus locations’.

I discussed the misuse of the
inf search term at some length in Support Scammers (mis)using INF and PREFETCH, but clearly it’s still being used. So, it turns out, is
prefetch:
Virus Bulletin’s
Martijn Grooten,
with whom I’ve worked several times on support-scam-related issues,
recently reported its reappearance in one of his blog articles for Virus
Bulletin –
Phone support scams: an old scam with some new tricks. In this instance, the scammer homed in on the fact that
rundll32.exe
was found in the Windows Prefetch folder (not surprisingly, as it’s an
essential system utility), and ran a Google search that flagged the fact
that malicious files sometimes masquerade as
rundll32.exe. Presumably, in the hope that a victim would be convinced that
prefetch was really flagging malware in this instance.
Martijn also mentioned the Indexing Service gambit flagged by Kaspersky’s
David Jacoby that I talked about in yet another blog – New Support Scam Gambits: Frozen Virus a Frozen Turkey.
The image below, from my older blog, shows typical misuse, where the
VBScript ‘service not running’ message is claimed to be proof that a
software or hardware licence has expired. In fact, the error message
simply shows that there is no such service as ‘software warranty’.

Or ‘software warrenty’, in the example cited by Martijn: scammers are
often notable for their haphazard spelling and command of English in
general, though good English is by no means an infallible indication of
honesty and good intentions.
View to a Shill
And, naturally, the old favourite Event Viewer (
eventvwr.exe)
still rates a mention in Martijn’s blog (after all these years!),
continuing to be misrepresented as showing the presence of imaginary
malware or system problems that the scammer can ‘fix’ for you.
Mac Attack
However, the last gambit I’m going to talk about on this occasion is
something a little different. While there has been the occasional hint
of Mac-specific scam action, cold-calling scammers don’t usually have a
script prepared for Mac users. (I particularly appreciated the scammer
who, when I said I was using a Mac – as in fact I was at that time –
went to consult her supervisor and then came back and said she was
unable to ‘help’ me.) However, a recent
blog article for Malwarebytes by
Jerome Segura describes how a company called Speak Support offering “Mac® Techical Support” misused the internet utility
ping in the hope of convincing a potential victim that he has no active protective software on his system.
When Jerome allowed Speak Support to access his Mac remotely using TeamViewer, the tech opened a terminal window and used
ping from the command line to query a site called protection.com. This is what I got when I did the same thing.
wilbur:~ davidharley$ ping protection.com
PING protection.com (72.26.118.81): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
Request timeout for icmp_seq 3
Request timeout for icmp_seq 4
Request timeout for icmp_seq 5
Request timeout for icmp_seq 6
Request timeout for icmp_seq 7
Request timeout for icmp_seq 8
Request timeout for icmp_seq 9
Request timeout for icmp_seq 10
^C
--- protection.com ping statistics ---
10 packets transmitted, 0 packets received, 100.0% packet loss
The ^C shows where I got bored with counting timeouts and terminated the request.
Winging it and Pinging it
So what does this tell us? The utility was designed, back in the
early days of networking, to determine whether a server was available by
sending it ICMP (Internet Control Message Protocol) packets, and to
measure how long it took for an acknowledgement to be received. In this
instance, the packets are not being acknowledged, which you might think
means that protection.com is not online.
However, it’s very common (and has been for many years, certainly
back when I was administering Unix systems) for Internet-facing servers
to be configured not to respond to ping requests, as a countermeasure
against certain classes of Denial of Service attack. So it’s not
surprising if the protection.com domain is configured not to respond.
And that appears to be the case: protection.com is certainly online at
the time of writing, even though ping isn’t acknowledged. The domain
actually belongs to Life Alert, which describes itself as “a Personal
Emergency Response and Home Medical Alert System company”, and seems to
have no connection whatsoever with Speak Support and its activities.
However, the essential message here is that the use of
ping
tells you nothing about whether the Mac is protected against malware.
However, the Malwarebytes blog suggests that scammers are asserting –
quite incorrectly and presumably with intent to mislead – that the ‘lost
packets’ message that results is an indication that the system is
unprotected.
I should make it clear that this
wasn’t a cold call: Jerome
actually made a call proactively to a ‘support line’ advertised on a web
site that offered Mac support ‘expertise’. He suggests that:
It’s quite possible the next time cold
call scammers phone you up, they’ll already have a script made for Mac
users as well, just in case.
An interesting speculation, but at the moment, I’m not seeing any
reports of cold-callers who use this gambit when a potential victim says
that they’re using a Mac. In fact, you’d think that even the most naïve
user would be slightly suspicious if someone rang him to say his
Windows PC was in trouble when he was actually using a Mac, but I guess
there are ways round that.
There are, however, two aspects to this scam that are of particular interest. One is that the attack
is
clearly aimed at Mac users, albeit Mac users who go out of their way to
contact Speak Support, and it might indeed fool a Mac user with no
experience of old-school Internet utilities or Unix command-line prompt.
The other interesting aspect is that this isn’t actually a Mac-specific attack, since the
ping
utility is supported on many platforms, including Windows. The
screenshot below shows the same ping request on a Windows 8.0 machine.

And this, just for complete information, is what a successful ping request looks like:

I hate to think what a support scammer would claim that successfully
pinging virgin.com tells us about the system I’m running, but it took me
quite a few attempts to find a well-known domain that
does acknowledge ping requests.
Martijn, Steve Burn of Malwarebytes, and independent researcher Craig
Johnston and I put together papers for Virus Bulletin 2012 – My PC has 32,539 errors: how telephone support scams really work – and CFET (Computer Forensics Education and Training) 2012 – FUD and Blunder: Tracking PC Support Scams – which cover much of this material in a lot more detail.
Hat tips to Martijn, Jerome, Greg Wasson for a conversation at this
year’s Virus Bulletin, and the many people whose comments have added to
our knowledge of this scam.