SEQUIM — Quality Assured Computer Services — which has offices in both Port Angeles and Sequim — has identified a method that allows hackers to infiltrate personal computers through a popular application.
Hackers are able to infiltrate personal computers through Skype, an internet-based telephone service provider offering free calling between subscribers, said Jim Manderscheid, who co-owns Quality Assured Computer Services with Steve Saiz.
Skype enables file transfers, texting, video chat and videoconferencing.
Manderscheid said the hacking method was discovered when his company serviced a customer’s computer in Sequim.
Sheri Crain, Sequim Police Department deputy chief, said so far the Skype hack has not been widespread in the area.
“This is certainly a new spin but we have no reports of it happening here,” Crain said.
Chief Criminal Deputy Brian J. King of the Clallam County Sheriff’s Office said no reports of the scam have been given to his office.
And while this method of hacking has a new twist, similar scams have been ongoing for years, said Port Townsend Police Department Detective Luke Bogues.
“Many people leave Skype running in the background,” Manderscheid said.
“This allows friends and family to video or audio call — in most cases for free.
“But here is the new twist. The user may get an incoming video call from what looks like a Microsoft Support Tech.”
This method tricks the operator into believing the call is from a legitimate source, Manderscheid said.
“To be clear, Microsoft will never call you by Skype or regular landline,” he said.
Once the user accepts the call, “it initiates all kinds of problems for the user, personally, and the user’s computer,” Manderscheid said.
If the call is received, the computer’s antivirus program has been overridden by the user to allow the caller to send a malware packet into the computer unchecked, Manderscheid said.
The damage starts with a severe level virus called “Expiro,” Manderscheid said, which can steal the user’s personal information and lower the security settings on their internet browser.
“It can also give a malicious hacker access and control of the PC,” he said.
“This is just the beginning. The user’s Skype contacts, email contacts and login passwords are stolen.”
And Expiro isn’t the only malicious software, known as malware, that can infect the computer through this type of attack, Manderscheid said.
Other malware includes ransomware, trojans and worms, he said.
“Once the call is received, the user will see a person who will introduce themselves as being from Microsoft,” Manderscheid said.
“Behind this person will be wall posters and paraphernalia that creates the illusion of an actual Microsoft office. The tech person may even be wearing a Microsoft shirt with badge. It is all staged and a con.”
The tech person at the other end, Manderscheid continued, might start with some small personal chit-chat commenting on local weather, and might even make it seem that the call is coming from a local Microsoft Support Center.
“Skype provides callers with information that can tell them the user’s location,” Manderscheid said.
“From there it is easy to gather more information such as local weather, traffic and news — all to make it more convincing to win the user’s confidence.”
After the introduction, the tech will ease into a conversation about a free diagnosis or tune-up, Manderscheid said.
Once done, the tech will claim to have detected problems with the user’s computer, and asks if the user would like the tech to take care of the problem, he said.
“This is another turning point,” Manderscheid said.
“The tech will ask for a credit card or other form of payment. If payment is made, these con artists can now add your credit and identity to their list of loot.”
There is also a chance that while making small talk the tech might have installed a ransomware program.
“If they are not paid for a service, the ransomware program runs, encrypting files on the user’s hard drive,” Manderscheid said.
“The computer’s data files are now held hostage. There is little likelihood that the files will be recoverable, even if the ransom is paid. Unless the user has a current data backup.”
“If someone falls victim to such a scam and loses money, the victim may file a report with us in addition to reporting to the Federal Trade Commission, but we will not investigate the crime,” Bogues said.
“The perpetrators of these crimes are not in our jurisdiction or even the state, and in most cases aren’t even in the United States.”
The bottom line, Bogues said, “is don’t do business over the phone or internet with businesses and individuals who you did not initiate contact with using a verified phone number or reputable website.”
To file a complaint, see http://tinyurl.com/PDN-FTCcomplaint.
________
Reporter Chris McDaniel can be reached at 360-452-2345, ext. 56650, or cmcdaniel@peninsuladailynews.com.