In the last few days I have become aware of three versions of a scam involving Norton products that you need to be aware of. All of them have the same theme. You’ve renewed your subscription for some Norton product and if you need further information or you want to dispute it, it provides a number to call. It will look something like this:

Now I took out the email header to preserve my client’s privacy, but there are three things that you should be aware if. The most important thing to be aware of is if you do not have an active subscription to a Norton product, do not call the number in the email. Beyond that, if you look at who sent it, you’ll likely see that it was sent from an email account other than Norton.com. That’s a big hint that this is a scam. The third thing that you should note is if you look at the quality of the English used in the email, it’s poor. And on top of that it creates a sense of urgency to get you to call the number. Which you should not do. In short, this is likely a phishing attempt to get your credit card details at the very least. Or further to that, create the conditions to access your computer to do who knows what to it.
The second version of this scam is something that I came across over the weekend when a older couple phoned me in a panic after getting an email with a PDF attached that looked like this:

Now I suspect that the scammers behind this one have moved to using a PDF because it is less likely to be picked up by an ISP’s spam filter. But other than that, it’s the same scam. And in the case of this older couple, it almost cost them $13,000 Canadian and caused them all sorts of grief when the scammer got hostile with them. I am working on a write up about this and that will be out in the coming days. But I will say that this illustrates how dangerous these sorts of scams can be.
The final version of this scam is extremely dangerous. Let’s start with the email that you will get:

You’ll note that like the second scam, you’ll get an email with an attachment. In this case an ISO file which is a disk image file that is commonly used to burn CD, DVDs or act as a container for software. It’s the latter that the scammer is using this for because if you open the ISO file (which by the way I absolutely do not recommend that you do), you will see this:

The first file that ends in .DLL is something that should set off alarm bells. Further investigation on my part shows that this is designed to deliver a virus payload to a Windows computer. And what sort of payload is it? Well, I will get to that in a moment. But let me get to the part about what happens when you use VirusTotal which is a website that analyze suspicious files, domains, IPs and URLs to detect malware and other breaches and automatically share them with the security community:

In this case, the payload was only detected by 6 of 66 virus scanners. Which is bad as that implies that this virus payload is ether new or new and improved. I am guessing the latter, but in either case, this underlines why you should never, ever click on anything in a suspicious email.
But what is the payload? This based on this write up suggests that this is a trojan that in short is designed to steal user account data relating to online banking systems, e-payment systems and plastic card systems. The data is then transmitted to the malicious user controlling the Trojan. But because I could not identify the exact trojan in use here, it may do other things that are even more dangerous.
The other thing that I will note is that there’s a phone number in the email. That suggest to me that the the person behind this will also act in the same manner as the first two Norton scams. Something that I briefly looked into by phoning the number and getting a supposed employee of Norton with an Indian accent.
That covers these Norton billing scams that you should be aware of. In the coming days, I will be doing a write up about the second scam in detail so that you can see what the scumbags behind these scams will do to you if you fall for these scams. And I will also be doing a more detailed investigation of the third scam to see if I can get any additional details that I will share with you in hopes of keeping you safe. So stay tuned for all of that. But in the meantime, be careful out there folks.
UPDATE: Well, investigating the third scam didn’t last long.
I phoned the number that was listed in the third scam (which for the record you should never ever do) using a phone that doesn’t allow the caller ID to be shown at their end and the phone was answered by someone with an Indian accent claiming to be working for the “Norton LifeLock Cancellation Department”. I then pretended to be someone who had gotten the email and asked the guy why I have got charged. He then proceeded to try and supposedly help me to cancel the subscription to Norton LifeLock which of course I didn’t have a subscription to said product. I guess it was at that point he noticed that I was calling from a blocked number and hung up the phone. I tried two more times and got two more people with Indian accents and got the same results. I am guessing that their playbook involves grabbing the phone number so that they can call back if they have to, or to use it to perpetrate future scams, or both. I am also guessing that if they see that the number is blocked, they see it as a threat and they hang up the phone.
So my take away is that they don’t get you with the virus, they’re going to get you if you call the number. Thus don’t fall into either of those traps by not opening any attachment that you get in any email that might be suspicious, or phoning any number that is associated with an email like this.
























Here’s An Example As To Why Scams Are So Dangerous
Posted in Commentary with tags Scam on July 1, 2022 by itnerdFrequent readers of this blog know that I spend a lot of time investigating, and telling you about the scams that I come across. Here’s some of the scams that I have been involved in addressing to show you examples of what ends up on my plate. The reason why I do this is that I know that they are very dangerous and I don’t want people to be taken advantage of. Also, by publicizing them, they become less effective as people will be aware of them. However the people behind these scams are good at evolving these scams which means that your head always has to be on a swivel or bad things will happen to you.
Here’s an example of something really bad that happened to an elderly couple.
I got a phone call last week from a woman who was referred to me by another client of mine. She was hysterical and in a complete panic. Once I was able to calm her down, she explained that she got an email from “Norton” about a subscription to one of their products that she was being charged for. She then called the number that was in the email to dispute the charges. That led to the person on the other end of the line getting access to not only her computer, but her bank account. And if it wasn’t for the people at her local bank branch stepping in, she would have lost $13,000. Beyond that, her computer had been “locked” by the scammer, and she needed my help to fix it.
Now my future self will step in here and tell you about the email that she got. The email that she received was clearly a Norton billing phishing email that I spoke about here. Specially it was the second variant where they attach the “hook” for the phishing attempt in a PDF so that it will evade spam filters. Unfortunately she got hooked and the scam was on from there.
When I arrived at this couple’s home, I found this:
She said that she never had a password on the computer before. But after the scammers had been on it, there was a password. It’s pretty ballsy for the scammer to leave a name as the password hint (which by the way is a fake name as the name Sam Wilson is the real name of the Marvel Comic book/movie superhero The Falcon) and a phone number. But it highlights that the scammer wants to hold the computer hostage to get paid. This is something that is becoming increasingly common where the scammer will take a computer that doesn’t have a password and change it so that in effect, they are holding the computer hostage in exchange for paying them. And it makes sense for a scammer to do because this computer had pictures of the grandkids and the like on it. That’s valuable for seniors and they would likely pay up to get that back.
Now I have come across another instance of this here, and I will copy and paste the advice from that story that will ensure that you aren’t a victim of this for your review:
While I understand that many of you out there want to be able to flip on your computer and bang out that email, you should never, ever compromise your security or it may not end well for you. You should always add a password to the user account that you set up, and you should never set it up to auto login. That way if you come across dirtbags like these, they can’t change your password because they would have to know your password to do it. Which they won’t. You can look at a tutorial like this to walk you through how best to set a password.
I ended up taking the computer to my home office to try and get past that. Fortunately I have access to the Microsoft DaRT toolkit. It contains a utility called “locksmith” which allows you to reset any local account on the computer. Now not anybody can have access to this toolkit as it is part of the Microsoft Desktop Optimization Pack (MDOP), a dynamic solution available to Software Assurance customers that helps reduce software installation costs, enables delivery of applications as services, and helps manage and control enterprise desktop environments. But one of my clients happens to be a part of Software Assurance which is how I got a copy of this toolkit. That means if you are in this situation, you may have to do some legwork to find someone who has this toolkit to assist you.
Using DaRT’s “locksmith” utility, I removed the password. Then I was able to look around the system. The next thing that I noticed was in the list of the installed programs:
The circled program is called AnyDesk which is a help desk application that many scammers use because it has remote access capabilities. That gives the scammer remote access to the computer anytime they want it. Which of course is bad. Thus I removed it. I also note that there was a compromised version of AVG antivirus on the machine. So I removed it and the AVG Secure Browser to be safe. The next thing that I did is that I used multiple antivirus apps to scan the computer for anything else that might have been lurking around. I didn’t find anything. I should note that all of this was done without the computer connected to the Internet. The reason for that was that I didn’t want to introduce the chance that anything else would pop onto the computer, or the scammer could get control again.
My next step was to reconstruct what happened. The reason for that was due to the fact that this couple’s children wanted to know what happened so that they could help their parents not get scammed again. That was made very easy due to the browser history being left intact. Here’s the play by play.
The victim opens the phishing email and reads it. Then calls the number. I know this because the email in question was the last email that was read. The victim gets the scammer on the phone and then the scammer goes to work. First he connects to the computer using a tool called SupRemo which is a zero configuration remote access tool designed for quick remote access. But I didn’t find any trace of this on the computer which makes me guess that they were not successful in installing it. That made the scammer go to AnyDesk and used that to gain control of the computer.
From there, I assume that the victim complained about the email that is telling her that she is supposedly being billed for Norton. That’s where I suspect that the scammer offers to help her to cancel this. Which led to the scammer taking her to this page:
Now this page looks official. But the reality was that it was a Google Docs Form. The big hint was that it says “Sign in to Google” in this picture. I am guessing that the scam involves walking the victim through “cancelling” their service with Norton via filling out this form. I looked at this form and it collects a ton of personal information including the date of birth. That’s makes identity theft a real possibility.
When the victim is done filling out the form, they get this:
This is where I suspect that the scammer convinces the victim to check her bank account for the refund. And that’s what happened here as here’s what happened next:
From what I understand happened next, the scammer over the next four hours tries to extract $13000 from her bank account from transferring it from the victim’s husband’s account to her account, to the scammer’s account. But clearly that failed which is why she was then directed to go the bank to make this happen. The scammer then printed the bank account numbers in Thailand to send the money to and sent her on her way. Fortunately, the bank was on the ball and put a stop to this. But she left the computer on which allowed the scammer to lock the computer when they did not get their money by changing the password so that they could hold it hostage.
The final thing that the scammers did was to trash the settings in their email program. But with the help of Rogers who truly went above and beyond here in not only sorting out what turned out to be a password issue because Rogers smartly uses app specific passwords, but also helping this couple with tips on how to not get scammed in the future which I will link to here, I was able to get their email setup and working again. And I was able to verify that their email wasn’t being redirected elsewhere. At this point the computer was back to normal. And one follow up a few days later confirmed that. As a precaution, the children set up Equifax credit monitoring due to the fact that so much personal information was shared.
Total time invested, four hours. So job done right?
No. I wanted to find out what how this scam worked. Thus, I decided to phone the number from a phone that has the caller ID blocked to get that understanding. Which by the way you should NEVER EVER DO. I got a person on the line who sounded Asian. Possibly from Thailand which would be consistent with the bank accounts that the victim was supplied with being from Thailand. The person online then asked me for some details from the supposed invoice in PDF form that I got. Here’s an image of the PDF:
He asked me for the Invoice number. And then proceeded to explain to me that I got this invoice because I had Norton 360 installed on my computer when I bought it and it is set to auto renew. He then explained that needed to get access to my computer to turn off an “auto renewal setting” and to walk me through a cancellation form. At this point I am pretty sure that if I decided to play along further, he would have tried to connect via the remote access software that I spoke of earlier and proceeded to do their evil work. But I cut it short and hung up.
Now I can see why this scam would be effective. Someone like me would know that there is no such thing as an “auto renewal setting” in antivirus software. But this person who is the victim here is 85 years old. So they, never mind the average computer user wouldn’t know that. Plus while computers from companies like HP, Dell, and Lenovo do come with antivirus software when you buy them, they are either free for life, or they are free for one year or so and then present you an offer to pay to continue to use it. They will never bill you in the manner of emailing you an invoice and saying that it will auto renew because they don’t have that info. But again, if you’re not aware of that, you might get sucked in.
So, how can you avoid being scammed. Well I have a lot of info on that here along with info on what to do if you have been scammed. But let me sum it up:
These days you have to be really careful as scammers are becoming increasingly sophisticated. And the second you let your guard down, it can really cost you. In this case, it almost cost an elderly couple $13000. But luckily it didn’t. Thus hopefully this illustrates how dangerous these scams can be so that you can protect yourself accordingly.
6 Comments »