HTML: FakeAlert-T [Trj]

. Codes: HTML: FakeAlert-T [Trj] HTML:EvilCursor-B [Trj] [URL:Phishing] 

. Filed under: Microsoft Tech Support Scams

. Properties: A technical support scam refers to any class of telephone fraud activities in which a scammer claims to offer a legitimate technical support service, often via cold calls to unsuspecting users. Such calls are mostly targeted at Microsoft Windows users, with the caller often claiming to represent a Microsoft technical support department.

In English-speaking countries such as the United States, Canada, United Kingdom, Ireland, Australia and New Zealand, such cold call scams have occurred as early as 2008.

The scammer will typically attempt to get the victim to allow remote access to their computer. After remote access is gained, the scammer relies on confidence tricks, typically involving utilities built into Windows and other software, in order to gain the victim's trust to pay for the supposed "support" services. The scammer will often then steal the victim's credit card account information or persuade the victim to log into their online banking account to receive a promised refund, only to steal more money, claiming that a secure server is connected and that the scammer cannot see the details. Many schemes involve convincing the victim to purchase expensive gift cards and then to divulge the card information to the scammer.

. Organizations affected: Microsoft

. Reported to:, Google Safe browsing (Report Phishing, Report Malware), Scammer, Netcraft (via browser extension) Emsisoft (via browser extension)

*Warning: For your safety, it is highly recommend that users do not visit any of the websites under the following codes:  HTML:EvilCursor-B [Trj] [URL:Phishing] 
These webpages are extremely aggressive and will cause crashes and other undesired effects.

. Screenshots:
 HTML:Tech-Scam-M [Phish]

HTML:EvilCursor-B [Trj]

HTML:EvilCursor-B [Trj]

JS:FakeAlert-L. [URL:Phishing]

. Offending URL's

*These websites are considered dangerous. For your safety, the links have been published as plain text.