<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.floodcomputingsolutions.com/blogs/tag/information-stealing-malware/feed" rel="self" type="application/rss+xml"/><title>Flood Computing Solutions - Blog #information-stealing malware</title><description>Flood Computing Solutions - Blog #information-stealing malware</description><link>https://www.floodcomputingsolutions.com/blogs/tag/information-stealing-malware</link><lastBuildDate>Tue, 07 Apr 2026 07:30:34 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Tech support scammers may try to trick you with a pop-up window that appears on your computer screen]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/Pop-upscam</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/windows scam.png"/>How to spot a pop-up scam.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QwgNT6yXTIK-LsuxplK6qg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_P8_oWfIcRI62eO0y1Vkb9A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ibME9ht4SuSxl9EHGYnZ7w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pQd-agU6QDGA5YJI0108iQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pQd-agU6QDGA5YJI0108iQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="font-weight:inherit;margin-bottom:10px;"><strong>Beware Of Tech Support Scammers Who Try To Trick You With A Pop-Up Window</strong></h1></div></h2></div>
<div data-element-id="elm_btHOvqd2S_mgpRpLz1VzLw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_btHOvqd2S_mgpRpLz1VzLw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><h2 style="margin-bottom:8px;"><span style="font-family:Comfortaa;font-size:18px;"><span>If you're like most people, you've probably seen a pop-up window appear on your computer screen at some point that looked like it came from Microsoft or Google.</span>&nbsp;The message in the pop-up might have said that your computer was infected with a virus and you needed to call a number to get help removing it.</span></h2><h2 style="margin-bottom:8px;"><span style="font-family:Comfortaa;font-size:18px;"><br></span></h2><h2 style="margin-bottom:8px;"><span style="font-family:Comfortaa;font-size:18px;">&nbsp;This is a scam known as a tech support scam, and it's designed to trick you into giving scammers remote access to your computer so they can steal your personal information or install malicious software on your device.</span></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><br></strong></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><br></strong></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><span><span style="font-size:32px;">What to do if you see a pop-up window on your computer</span></span></strong></h2><h2 style="margin-bottom:8px;"><div><div style="color:inherit;"><br></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">If you see a pop-up window on your computer screen that is advising of a breach with a tech support number to contact, its likely a scam.</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">Tech support scammers often use pop-up windows that look like they’re from Microsoft or another well-known company to trick you into giving them remote access to your computer. They might say they’ve detected a virus or other problems and offer to help you fix them. Or they might say you need to buy new software or pay for a service to protect your computer.</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">If you see a pop-up window like this, don’t click on it. Don’t give the person who opens it remote access to your computer. And don’t buy anything from them.</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">Large computer and software companies will never send unsolicited email messages or make unsolicited phone calls to charge you for computer security or software fixes. Microsoft also will never ask you to provide your credit card or bank account information to them.&nbsp;</span></div><div style="color:inherit;"><br></div><div style="color:inherit;"><img src="/windows%20scam.png" alt="Example of Microsoft Scammer Pop-Up"><br></div><div style="color:inherit;"><span style="font-size:18px;font-style:italic;">Example of a SCAM Pop-up</span></div></div></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><br></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><span><span style="font-size:32px;">How to tell if the pop-up is from a tech support scammer</span></span></strong></h2><h2 style="margin-bottom:8px;"><div><div style="color:inherit;"><br></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">It can be difficult to tell if a pop-up window is from a tech support scammer. Here are some signs to look out for:</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">- The pop-up window claims to be from Microsoft or a well-known company.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">- It claims that a virus or other problem has been detected on your computer.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">- It requests that you give the person who opened the pop-up window remote access to your computer.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">- It requests that you buy a product or pay for a service to protect your computer.</span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">If you’re unsure whether the pop-up window is from a tech support scammer, don’t click on it. Don’t give the person who opened it remote access to your computer. And don’t buy anything from them.</span></div><div style="color:inherit;"><br></div><div style="color:inherit;"><img src="/locked%20screen%20scam.png" style="width:660.9px !important;height:522px !important;max-width:100% !important;" alt="scammer page example "><br></div><div style="color:inherit;"><br></div></div></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><br></h2><h2 style="color:inherit;font-weight:inherit;margin-bottom:8px;"><strong><span style="font-size:32px;">What to do if you've been scammed</span></strong></h2><h2 style="margin-bottom:8px;"><div></div></h2><h2 style="margin-bottom:8px;"><div></div></h2><h2 style="margin-bottom:8px;"><div style="color:inherit;"><br></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">If you think you may have been scammed, there are a few steps you should take: </span></div><div style="color:inherit;"><span style="font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">1. Don’t panic - take a breath and try to remain calm.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">2. Contact your bank or credit card provider to check if any suspicious charges were made.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">3. If you gave the scammer remote access to your computer, change the passwords for all your online accounts.</span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">4. Contact your IT professional so they can run anti-malware software to remove any malicious software the scammer may have installed. Check for new vulnerabilities created or crawlers left behind to catch your data.&nbsp;</span></div><div style="color:inherit;"><div><span style="font-size:18px;font-family:Comfortaa;">5. Report the scam to the <a href="https://reportfraud.ftc.gov/#/" title="Federal Trade Commission (FTC)" rel="">Federal Trade Commission (FTC)</a>.</span></div></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;">6. Let other people know about your experience. </span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;"><br></span></div><div style="color:inherit;"><div style="color:inherit;"><span style="font-family:Comfortaa;"><span style="font-size:18px;">Remember, you never have to pay to talk to tech support representatives. If you receive any calls or pop-up windows that tell you there is something wrong with your computer and you must pay to repair it, it<span style="font-size:18px;"> is li</span></span><span style="font-size:18px;">kely a scam.</span></span></div><div style="color:inherit;"><span style="font-size:18px;font-family:Comfortaa;"><br></span></div></div></h2></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 14 Apr 2023 12:40:02 -0700</pubDate></item><item><title><![CDATA[Why All Your Data Is Gone ]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/ransomware</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/images/encryption-your-data-digital-lock-hacker-attack-and-data-breach-big-data-with-encrypted.jpg"/>As ransomware becomes more common, businesses must take steps to protect themselves. One of the most effective ways to do this is by maintaining regular backups of all data.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_8uluC0TcS7eACy4ioP0ygg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Uu6GDNEZSa6LiJdweccyBA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_MpNrl7_-TFKLpwECuEemeQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_idcOGnQ1QDOhYoB_2Se4ww" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_idcOGnQ1QDOhYoB_2Se4ww"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Ransomware VS Backups&nbsp;</h2></div>
<div data-element-id="elm_nORlEs4OTECJr0LF7T6HvQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nORlEs4OTECJr0LF7T6HvQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:14px;">Ransomware is a growing concern not just for individuals, but businesses as well. This malicious software infects computers, servers, emails, and other places with the intent to extort money from the victim. It does this by encrypting all of the data, presenting the victim of the attack with a demand for payment in order to have their files returned. Unfortunately, the criminals behind ransomware attacks often have no intention of actually providing the decryption keys, even if the ransom is paid.</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;"><br></span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">&nbsp;The best way to protect against ransomware is to take preventive measures. This means regularly backing up data so that if the system fails, it can be recovered. Backups should include all of the important documents and files so that even if a major parts of your systems become compromised, you are still able to access the backed up files. Keeping up to date with system updates and antivirus software also is a good line of protection against this type of attack.</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;"><br></span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">&nbsp;Businesses should be especially attentive to ransomware attacks, as the threat is quite real for them. Not only does the loss of data have a direct financial cost, there are other complications that could arise from an attack. For instance, the cost of the resulting downtime could significantly impact a business’s bottom line, and it could also result in the loss of clients and customer loyalty if confidential information was among the stolen data.</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;"><br></span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">&nbsp;By acting quickly and taking the necessary steps to prevent ransomware attacks, businesses can greatly reduce the risk of being exposed to one of these damaging events. Taking proactive measures such as backing up data regularly and having an updated antivirus program can make a huge impact. It may seem like a bother, but the effort is worth it when it comes to preventing a data breach.</span></span><br></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Apr 2023 15:53:04 -0700</pubDate></item><item><title><![CDATA[Cookie Monster Strikes Genesis]]></title><link>https://www.floodcomputingsolutions.com/blogs/post/Genesis-Market-Seized</link><description><![CDATA[<img align="left" hspace="5" src="https://www.floodcomputingsolutions.com/images/fbi-detective-using-laptop-in-his-office.jpg"/>The Genesis is a dark web marketplace that was created in 2018. In 2023, the FBI shut down the Genesis marketplace in an operation called ‘Cookie Monster’. The operation was a major success for the FBI, as it dealt a significant blow to the black market on the dark web.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_FgMq_ZCYTq-Vs2sRGkfLsQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_IT5gQnZcS6aNPgWV_ATJzg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_u8KxAkOqRq6hxB_32uWjwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_NVbWIJQOTX6yoBEQos90BA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_NVbWIJQOTX6yoBEQos90BA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Genesis Market Seized</span></h2></div>
<div data-element-id="elm_GAHippj5RD-lMsrEExnmmQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GAHippj5RD-lMsrEExnmmQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">Genesis Market appears to have been taken down in connection with the FBI's Operation Cookie Monster. From what we have learned it appears that the FBI has orchestrated a sweeping act against various websites that are thought to be connected to dark web and cybercrime activity.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Genesis Market homepage now lists the domain as being seized in connection with Operation Cookie Monster. This appears to be done as a result of&nbsp;a warrant issued by a Wisconsin court.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Reports include dozens of arrests in the United States and other countries. We are interested to see how this story continues to develop. Including 120 arrests around the Genesis Market sites.&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">The&nbsp;<a href="https://www.f5.com/labs/articles/threat-intelligence/genesis-marketplace--a-digital-fingerprint-darknet-store" target="_blank" rel="noreferrer noopener">Genesis</a>&nbsp;marketplace has been around since late 2018, offering cybercriminals access to hundreds of thousands of so-called ‘bots’ that could be used to carry out malicious activities and bypass anti-fraud systems.&nbsp;<br></p><p style="text-align:left;"><br></p><p style="text-align:left;">The bots were directly related to obtaining the browsers&nbsp;fingerprint, using malicious&nbsp;malware. This particular site was an invite only organization.&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">It will be interesting to see how this Operation Cookie Monster continues to unfold.&nbsp;</p></div>
</div><div data-element-id="elm_K89khxwgv-WoWJN6Ugjklw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width: 1110px ; height: 623.86px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width:723px ; height:406.35px ; } } @media (max-width: 767px) { [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"] .zpimage-container figure img { width:415px ; height:233.24px ; } } [data-element-id="elm_K89khxwgv-WoWJN6Ugjklw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Cookie%20Monster.png" width="415" height="233.24" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_e_u7d6kMT5GZmp_FNk1TyQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 05 Apr 2023 12:31:50 -0700</pubDate></item></channel></rss>