Sitting in front of her PC, the phone in her hand connected to a tech support company half a world away, Sheryl Novick was about to get scammed.
The company she had reached, PCCare247, was based in India but had built a lucrative business advertising over the Internet to Americans, encouraging them to call for tech support. After glimpsing something odd on her computer, Novick did so.
âI saw some sort of pop-up and I donât know if thereâs a problem,â she told a PCCare247 tech named Yakeen. He offered to check the âmanagement partâ of her computer for possible problems.
âThis is very, very important part of the computer and it work like the human brain, all the major decision, all the action, all the result is taken by this management part,â Yakeen said in a strong accent relayed over a poor-quality phone line that sometimes made comprehension difficult. All he needed to run his test was total control of Novick's Windows computer.
She agreed, downloading and installing a remote access tool. When it was in place, Yakeen reached out through the Internet, took control of Novickâs mouse cursor, and opened a program called Event Viewer. The scam was about to begin.
Event Viewer is a built-in Windows tool designed to make visible the millions of mostly unimportant background activities running beneath the hood of a modern computer. Few mainstream computer users have even heard of it, much less run Event Viewer of their own volitionâ"which explains why few mainstream users would know that, in a system as complex as Windows, Event Viewer will always display errors, most of them trivial. Thus, should someone want to convince mainstream users that their computers are riddled with problems, Event Viewer is a reliable combination of the inscrutable and the terrifying.
Yakeen showed Novick a series of bright red warning messages in her Event Viewer logs.
âIt has 30 errors,â he told her, while a separate subsection of Event Viewer showed 43 more. Based on these 73 problems, Yakeen formulated a quick and utterly improbable diagnosis for Novickâs problems.
âYour computer is hacked by someone,â he said. âThey are using your name and your ID, your computer to do some cyber fraud and cyber terrorism.â
Leaving no time for Novick to raise questions about how obscure Windows errors might indicate the presence of terrorist hackers, Yakeen opened a command prompt on Novickâs machine and ran a text-based tool called ânetstat.â Netstat shows all of a computerâs network connections, both inbound and outgoing, and in this case it showed a single established linkâ"one that pointed outside the US.
âIâm 100 percent sure and I strongly believe that you have some hacking issue working in your computer,â Yakeen said as he pointed this out to Novick. âYour computer is being hacked by someone. And they are doing some criminal activity using your name, your computer, your computer address.â
This was a brazen lie; forensic examination would later conclude that the single connection displayed by netstat was in fact the remote access tool that Yakeen was using at that moment to control Novickâs machine.
To complete his examination, Yakeen then told Novick that he would scan her computer for viruses. To do so, he ran a command called âtree.â Filenames immediately filled the screen, scrolling away in a blur as hundreds of new names took their place. When the list stopped moving, the command prompt read:
C:509 virus found
âNow can you see the number of virus found in your computer?â Yakeen asked.
â509 viruses?â Novick asked.
âYeah, 509 virus working your computer. And they areâ"the hacker are directing your information and yourâ"it might be possible your e-mail account and your Facebook account is also hacked by the hacker because hacker are using your name and your password. All the data, photographs, radio, and your e-mail are already hacked by the hackers, so we have tried to recover all the data from the hackers and install an anti-hacking tool in your computer, okay?â
The situation sounded badâ"unless you knew that the tree command used by Yakeen has nothing to do with viruses. It merely lists all files within a directory, showing them in a hierarchical âtreeâ arrangement of folders, subfolders, and files. The scrolling list had been entirely ordinary files on Novickâs machine; it had stopped only because Yakeen had canceled its run. As for the words â509 virus foundââ"Yakeen had simply typed them out himself at the command prompt, hoping that Novick would believe them to be output from the âvirus scanner.â
PCCare247 said it was ready to "despise every technical folly ready to play mess with the lives of naïve techno greenhorns."
Yakeen didnât give Novick much time to think about the diagnosis; with the problem identified, he barreled into his sales pitch for a 45-minute cleaning of her computer. By the end of this process, Yakeen promised that he could âremove all the hackers, remove all the errors and 509 virus from the computer and recover all the data, okay?â
All Novick needed was $400.
âIs there any way to do it cheaper?â she asked.
âCheaper?â said Yakeen. âOkay, please hold the line because I am just discussing this issue with my accounts department and definitely I will give you a discount, okay?â
After a brief pause, the âaccounts departmentâ reduced the price to $360 and threw in three years of future tech support.
â$360 is a lot,â Novick responded, still haggling. âIs there any way you could do it for like $300?â
Yakeen transferred her to the floor âaccounts manager,â who offered a $300 plan that included two years of future tech support. Novick agreed and provided her credit card. She thanked PCCare247 for helping her out.
âThatâs our pleasure, maâam, and because, you know, PCCare247 just focuses on the customer satisfaction,â a company rep told her when the work was done. âOur main aim is to satisfy the customer needs, right?â
What Yakeen didnât know was that Novick was actually a Federal Trade Commission (FTC) investigator who had been assigned to global âtech support scams.â She had recorded the entire encounter, which had been conducted using a clean PC located within an FTC lab.
After the call, the FTC sent Civil Investigative Demandsâ"requests for informationâ"to just about every US company that had done any sort of business with PCCare247: banks, credit card processors, domain registrars, telephone companies, Facebook, Google, and Microsoft. In October 2012, after months of work, agency lawyers had finally assembled their case into a 15-page complaint against PCCare247 and its owner, Vikas Agrawal (sometimes spelled Agarwal).
âThe Defendants operate a massive scheme that tricks consumers into spending approximately $139-$360 to fix non-existent problems with their computers,â the complaint alleged.
Those fees added up to serious revenue for PCCare247. In just one year, from October 2010 to September 2011, $4 million had been deposited in the two main PCCare247 bank accountsâ"and that was just from US residents.
The company used this cash to build more business, spending more than $1 million through at least seven separate advertising accounts with Google. The money bought âsponsored search resultsâ that appeared when users searched for terms, including âvirus removal.â
But PCCare247 went further, taking out ads on search terms like âmcafee phone number usa,â ânorton customer service,â and âdell number for help.â The ads themselves said things like âMcAfee Support - Call +1-855-[redacted US phone number]â and pointed to domains like mcafee-support.pccare247.com. As numerous complaints attest, less savvy computer users searching the Internet for specific tech support phone numbers would see PCCare247âs number near the top of their screens and assume that this was an official line.
The tactic reached huge numbers of people. One PCCare247 ad account with Google produced 71.7 million impressions; another generated 12.4 million more. According to records obtained by the FTC, these combined campaigns generated 1.5 million clicksâ"a 1.8 percent clickthrough rate. Rather than cold-calling peopleâ"a preferred tactic of many tech support scammersâ"PCCare247 instead placed its ads and waited for the calls for help to roll in. The calls were forwarded to PCCare247âs operations in India, where people like Yakeen took over. Some may well have offered legitimate tech support, but even PCCare247 admits that not all did.
Not surprisingly, this business model produced complaints. In New York, the state in which PCCare247 lists its US headquarters (in a virtual office), the Better Business Bureau gave the company an "F" after receiving 27 complaints.
A typical complaint runs like this: a woman begins having computer issues late one night. She Googles âNortonâ and, instead of calling Norton tech support, ends up dialing a PCCare247-linked company. The technician âtold her that her computer was corrupted and being hacked and she had security issues and if it spread to other computers he would have to notify the FBI.â The woman wakes her husband, who is agitated that she already provided her credit card number. He calls PCCare247 to demand they not charge his card but the tech âkept talking about hackers and wouldnât shut up.â PCCare247 then charges the couple three times at $150 each. When the man calls back later, enraged at the charges, the company promises a refund and asks him ânot to contact the State Police or anyone else.â
Over at the FTC, 300 complaints poured in to the agencyâs Sentinel database. Reading through them serves as a reminder that most mainstream users have absolutely no idea how their computers work and that they will in fact seek out technical support when their speakers are on mute or when they canât eject a CD from the drive.
As one senior citizen, who thought he was calling Dell tech support, recounted: âdescribed my problem to the man (heavy Indian accent) and he told me he needed to access my computer to see what the problem was. He took me to the site where he could access my computer using a specific code. After accessing my Dell computer, he said Oh My God. Your computer has been infected by dozens of viruses. There is a hacker in your computer accessing all your personal and banking information right now⦠I was scared at that time. I do a lot of shopping on the computer and have my banking and retirement information on it.â
The companies processing financial transactions for PCCare247 were also unhappy with the constant stream of chargebacks and complaints. Vikas Agrawal had created many separate PayPal accounts, for instance, but at least three of them had been frozen and set to âLimited-Highâ status due to security concerns.
PCCare247 faced a constant battle to accept payments, especially credit cards. The company eventually went to a US resident named Navin Pasari, who applied for at least 13 merchant accountsâ"many of which were declined upfront or cancelled later due to excessive chargebacks.
Given this history, it wasnât difficult for the FTC to obtain a temporary restraining order (TRO) against PCCare247, an order that made it all but impossible to do business in the US. Most of the companyâs cash had already been transferred to Indian banks (only $1,700 was left in US accounts), where it would prove hard to reach, but the TRO did shut down the companyâs domain name, local phone numbers, and credit card processing. New money would not be flowing.
âThe FTC litigation has effectively shut down the [PCCare247] business,â the company complained to the federal judge overseeing its case. It admitted to âsome improper conductâ but attributed this only to âsome overzealous sales personnel [who] crossed the lineâ and said that âthey will be dismissed or retrained.â
In PCCare247âs view, it was simply a third-party tech support company that advertised on Googleâ"and what was wrong with that? In a separate declaration, Vikas Agrawal added, âPCCare247 wants to be a good corporate citizen.â
No comments:
Post a Comment