Hello. My name is George and I’m from your tech support team.
But am I really from your tech support team?
5/8/20251 min read


Hello. My name is George and I’m from your tech support team. I may have a slight accent that you don’t recognize but ignore that. I’m here to help.
I see you are having issues with your computer. Is that right?
No? Well, maybe I’ve confused you with another user in our ticketing queue. I’ll have you know we are very backed up with tickets right now. While I have you on the phone, is there anything I can help you with? (Social engineering)
Oh, you’re having an issue with an application login? Sure, I can help. I’m putting a link in the chat right now. Please click the link and log in using your corporate credentials and I can have a look at that issue. (Credentials compromised)
Thanks for that. I’m connecting to your system right now. I see you may have some machine configuration issues. Let me install an application that can detect and fix those issues. If you get a prompt to allow this application, please click the allow button. (Malware installed)
I’ll have to get back to you on that application login. There are some changes needed on the back end to get this fixed. Thanks for your patience and have a good day. (Attack complete)
Summary: This type of social engineering attack can be especially dangerous. Not only does the attacker have your username and password, they’ve also installed malware that can potentially capture key strokes as well as scan your network for vulnerabilities. They also have access to any data or systems you have access to. Always verify you are speaking to an actual member of your tech support team. Ask questions. Be skeptical. If nothing else, hang up and call the tech support team directly.
For more information on how Cloud Security Solutions can help please email or visit our website.
Contact US
info@cloudsecurityservices.tech
© 2025. All rights reserved.
Social Media
Submit an Inquiry