Threat Database Phishing 'Error Code: 0x80073b01' Scam Pop-Ups

'Error Code: 0x80073b01' Scam Pop-Ups

During an examination of suspicious websites, infosec researchers discovered a page operating as a platform for technical support fraud. Visitors of the site are presented with misleading pop-up messages, such as the 'Error Code: 0x80073b01' scam pop-ups, as a way to deceive them into believing their computers are compromised. It is essential to avoid such websites, as they are designed to lure unsuspecting users into providing sensitive information, transferring money or taking other actions.

Falling for Tactics Like the 'Error Code: 0x80073b01' Pop-Ups May Have Far-Reaching Consequences

The deceptive message exhibited by this technical support tactic Web page masquerades as an official alert from the Microsoft Windows Security Center. This message asserts the identification of five instances of virus or malware infections on the user's device, accompanied by an error code denoted as 0x80073b01.

Within the fake alert, there is a cautionary note regarding a significant breach in security that places the user's personal data, banking details, and web-based login credentials in jeopardy. The users are strongly encouraged to supposedly establish contact with Microsoft Windows Support by dialing the provided 866-552-3512 number to seek assistance in rectifying the situation.

The objective of this tactic is to manipulate users by instilling the belief that their devices are under the threat of viruses or malware, thereby creating a sense of urgency and anxiety. Through the presentation of a counterfeit error message along with a seemingly genuine contact number for Microsoft Windows Support, the fraudsters intend to delude users into initiating calls to the provided number.

Once users make contact, the fraudsters might employ a variety of tactics to extract money from their victims, often by offering unnecessary services, requesting remote access to the affected computer, or promoting deceitful software. Examples of such tactics include instances where scammers exploit legitimate software to attain remote access to computers.

Furthermore, the fraudsters could endeavor to procure sensitive personal information, such as credit card details or login credentials, with harmful intentions like identity theft or financial fraud. Moreover, these scams often serve as a conduit for the distribution of malware threats as well.

Be Careful with Unexpected Messages Found on Dubious Websites'

Technical support frauds are designed to deceive and defraud users by posing as legitimate technical support representatives. There are several red flags that can help users recognize and avoid falling victim to these tactics:

  • Unsolicited Contact: If you receive an unexpected phone call, email, or pop-up message claiming to be from a technical support company, especially if you didn't request assistance, be cautious. Legitimate tech support won't contact you without prior communication.
  •  Urgent Warnings and Threats: Fraudsters often create a sense of urgency by warning you of a supposed security breach or virus infection on your device. They might threaten to lock your computer or delete your data if you don't take immediate action.
  •  Errors and Fake Messages: Be skeptical of pop-up messages or alerts that appear while browsing the Internet, claiming your computer has a virus or other issues. Legitimate alerts from your operating system or antivirus software will not ask you to call a phone number for assistance.
  •  Unsolicited Remote Access Offers: Fraudsters may ask for remote access to your machine under the guise of fixing problems. Never grant access to someone you don't know or trust, as they can install unsafe software or collect personal information.
  •  Request for Payment: Legitimate technical support services will not ask for payment upfront to diagnose or fix a problem. Scammers often demand payment through unusual methods like gift cards or cryptocurrency.
  •  Unprofessional Communication: Poor grammar, spelling errors, and unprofessional communication are common signs of a scheme. Legitimate tech support companies maintain a professional standard in their communications.
  •  Unknown Caller IDs: Fraudsters may use caller IDs that appear to be from well-known technical companies or official sources. However, these can easily be faked.
  •  Asking for Personal Information: Be cautious if the caller asks for sensitive information like passwords, credit card details or social security numbers. Legitimate technical support will never ask for such information.
  •  Pressure to Make Quick Decisions: Fraudsters often pressure victims to make immediate decisions or take immediate action, preventing them from thoroughly considering the situation.
  •  Unusual Payment Methods: Be wary of requests for payments by using unconventional methods, such as wire transfers, gift cards, or virtual currency. Legitimate companies typically accept more secure and established payment methods.
  •  Refusal to Provide Details: If the caller or email sender avoids providing specific information about their company, their location, or how they obtained your contact details, it's likely a scheme.
  •  Inconsistent Information: Fraudsters may provide conflicting information or change their story when questioned. Legitimate technical support representatives should be able to explain issues clearly and coherently.
  • Pressure to Install Software: If the caller insists on you installing software that you're unfamiliar with, especially if it's from a non-official source, be cautious. This software might be malware or give the fraudster access to your device.

It's crucial to stay vigilant and skeptical when encountering any unexpected tech support communication or warnings. If you suspect a schedule, do not provide any personal information or access to your device. Instead, independently contact the official customer support channels of the company in question to verify the authenticity of the communication.


Most Viewed