Behind a scam

Video Statistics and Information

Video
Captions Word Cloud
Captions
in this video you're gonna see a scammer at work the screen in the middle is a remote desktop connection to a victim and the screen behind is his own PC I've had to blur the webcam section this video because of YouTube's policy but if you're a parent of mine you can see the whole thing on blurred so let's have a look at what this scammer is doing critical alert for a boy wash that your computer is still working I've just switched on the scammers webcam and you see in the next few minutes that he tries to figure out which application has turned the light on he thinks it's the void application X light because it has a built in camera but of course it's not it's me right no let me go ahead and check out the status of the services of your machine just to make sure the services of your computer are working fine or not okay he's mid scam so he keeps carrying on regardless what a professional you can see overheads a system configuration you'll see a colleague here over shoulder occasionally and that's because there's about ten people he work in this call center they give their name as Who mighty master but that's a fake name I'll say exactly who they are towards the end of this video each and every single service is very important for a computer because it's run and operated by Microsoft Corporation and if I talk about your computer so it has been 70 to 80 percent services of your computer have been stopped which is not running whatsoever home IT master will phone people in the UK trying to get them to fall for tech support scams and that's exactly what's going on here he will give his name as Peter but in fact his real name is giant giant is still desperately trying to find out why is webcam light is on so if you haven't stopped these services that simply means that the hackers have been connected with your computer they have stopped the services of your computer he brings up a spreadsheet of all the people he scammed in the month of March all the ones in green are the people that he's recontact 'add and got yet more money out of all right because if you have a look sir all the services are in check and there is no option to enable oh there is an option to disable all but there is no option to enable all the spreadsheet behind all of this contains credit card details in plain text so this is why we need to update them all ok now being a vise person and a computer user what do you understand by the world drivers for a computer the scan relies on the people at the end of the phone not really knowing what he's talking about and he signs condensing enough to get them to make a payment but this particular company follow it up with lots more phone calls they will sell the victim something for hundreds of pounds and then a few weeks later bring them back to say they've got a hacker problem and they'll need to spend more money yeah what driver sir I'm going to check it on Google ok I'll fast forward through this part because it's all part of a standard script he will identify a process called CS RSS a legitimate process and do a google search for it but it's not a real Google search watch woody dog yeah and let's see what Google sees about it ok he opens up a notepad on his own PC and copies this link and he does a Google search for CSRs s and instead of relying on the Google search result he will simply paste that link into the victims browser they're ready top it says client when time prosess i'm just clicking on that so now the victim believes that it's the first and top result on Google search engine when it's nothing of the sort I want you to read out this two paragraphs for me which have this highlighted for you with a blue color all of this builds on a narrative he wants the victim to believe he really does have a hacker problem ok so you can see by yourself how harmful this program is for your computer the same program is used on your computer 13 and 13 26 times another line the process just runs a lower priority than most and so that means the hackers have intentionally installed this program on your computer and with the help of this program they are accessing your computer from remote locations not only that said with the help of this program they are using your personal information for criminal activities and fraud purchases okay it don't seem incredible that people believe some of these lies but unfortunately this happens every day and this company make a fortune out of it I'm going ahead and running a free instant scan on your computer this can we'll take one and a half minutes and of course no scam would be complete without running the tree command and typing something that the scammer wants the victim to see the scan is going on I hope is visible to you but we can now see and hear him typing the scan will read out the entire data whatever you have got and then this will let us know how we can stop everything to be happening okay once this message has been typed he can sit back and relax waiting for the tree command to complete before what is typed is displayed oh the scan is being stopped now sir could you please do a spelling mistake I mean I wanted to ask you that for what purpose do you use the computer sir so he thinks of a question to distract the owner while he corrects this mistake could you please read out the last scan for me once corrected it's safe for the victim to read out his message but of course this scam is all about getting money out of the victim and a forward wind through the next eight minutes of the scam because they all pretty much follow the CM pattern so how do they get payment okay so I would like to know from you how far is Manchester from your place oh mighty master pretend that they work in a business park in Manchester and even if a Manchester phone number because physically the security is only available in Manchester very sneaky this scammer runs the SIS key command effectively locking the victim out of his own PC Microsoft have removed the SIS key command just because it was so abused by scammers all right like I said physically it's only available in Manchester but if you really wish to save your computer your other devices your name your identity being a multinational company we do support some online stores you must have heard about the online stores names like eBay Amazon oh mighty master yeah yeah that well-known international store home IT master anyone sir I am going to fix it for you at this stage the victim has got a bit suspicious and he is now asking for the scammer to restore his PC back to its fully working form but of course gent wants money so he starts doing things like hiding the taskbar and removing some applications from those I'm just selling I'm just trying to tell you that there is a requirement of a security system which you have to get by yourself that's all I'm saying you don't need to pay any need to Mesa our services is free of charge there is a requirement of a security system security system is something which is not come so free your computer scan itself say that you do require the victim is becoming increasingly angry and I just wants him off his computer so sir I am if you if you can if you give me 10 to 15 seconds I will speak to any of the online store and I can tell you about the price and the packages and the timeframes of this network security to you sir by this stage his taskbar is hidden also the applications have been removed from that taskbar and his background has been changed and modified to come down from the top of the screen we can't leave this computer as it is as the lady have told you in the first place that in order to solve the hackers we have only two options either we need to stop the hackers from your computer or else we need to stop you for using this computer by terminating that by canceling the license of your computer because once we cancel the license of your computer that means from tomorrow onwards neither you would be able to use that computer anymore and not the hackers and while the victim is still being pastured he decides to download some personal files of the victims PC with supremo the victim doesn't even know until unless you won't put this sir and nothing nothing have been deleted from you system yet but if we cancel the license of you nothing has been deleted yet the scammer keeps upping the ante under star getting threatening so we are not authorized to check your personal stuff like that but we can't leave this computer he claims he's not authorized to check personal stuff as he's reading through the skies pictures so sir I haven't told you the price yet so why you don't want to stop the hackers bye why don't want you to spend okay I'll tell you the price of this network security okay you will get the lifetime package of it the one-time payment for the entire life okay only in only 445 pounds and 99 wins he chooses 45 pounds because this is the minimum mind that his website allows many other victims have been scammed for thousands I have mentioned sir I have mentioned I have mentioned three stores in front of you eBay Amazon home IT master you can purchase it from anywhere fortunately this potential victim was able to persuade the scammer to restore his machine to its original working order however he was justified to apply another ciske when the victim pulled the plug on the computer this was a good move but if you didn't realize that it was a scam what exactly would who mighty master do to your PC what sort of software would they leave there and how would they convince you that they were legitimate company I watched a few times as this company would rename some DOS patch files and upload this to their victims pcs I have looked very carefully at what those batch files actually did here are two real files which they did upload to some victims pcs the first one just clears the Event Viewer and the second one claims to be an email to protector but as you can see here it does a few pings says it's updating and actually does nothing whatsoever if you relied on this to protect your email you'd be in deep trouble likewise with their so-called network security so who exactly are whom I teamaster and just how much money do they really make on these scams the real company name is Q Tech BPO that's Business Process Outsourcing under based in Kanpur in the north of India their operation is located in a shopping mall on the fourth floor in 408 and the details of their address are shown on screen now but what shocked me most about qtek was the sheer might of personal information which they stored unencrypted on their pcs this is a list of personal information and spreadsheets on most of their victims and this is what those text files actually looked like when you examine them they contain the full name telephone number email address and postal address followed by a coal password something I've seen scammers use a lot these days but most shockingly he had full unencrypted debit card details for this victim the scammer also had the sort code and account number of his bank account understood at birth and when I looked at these text files there were mostly people in their seventies and eighties he had a list of how much had been scammed in this case over three thousand vines in a year and supremo ID and password for potentially multiple devices this would mean that the scammers could regain access at will but it was the spreadsheets which give me the most information not only did it detail all the victims details but I could see clearly what the names of all the scammers were as well I counted ten individuals and their names are on screen but I also had all of the email addresses of the victims the ones in green had money taken multiple times and the ones in white just once and these agents and cue tech BPO would concentrate on the ones and white to make sure that they had extracted as much money as possible so while one set of scammers were extracting money from existing customers another set we're trying to get new customers recruited like this am I talking to miss George Yeo hi miss George how are you this evening mom are you okay let's go - no mom well mom this side is Edward Edward scary I'm calling you from Windows computer customer care Department mom the school is in regards with the Windows computer or the Windows laptop which you possess miss by mr. George sorry to bother you Polly each scammer would take a note on who they needed to call back and even took notes on who trusted them so I needed a way to stop Almighty master from scamming more people and usually the easiest way to do this is to have a look at what their payment gateway is on their website they password protect their payment pages but it's not difficult to work out what that password is in fact it's in clear text at the bottom of the source code here it is use that username and password you can see the various packages on offer these are the mites that they will charge each victim and sometimes they've allowed a quantity of these options just to make sure that they get as much money as possible they will fill in the personal details of the person who's being scammed and finally make the payment but this is the weak spot in their scam they make use of a third party payment gateway called red sis which is a Spanish company depending on which check box the agent has ticked the payment will go through commercial Global Payments Bankia or real via I don't know what these differences are but have passed all this information on to red sis the report of fraud was made much more difficult because their complaints page only seems to work in Internet Explorer however they did agree that they would process this complaint but even a week after I had made my initial complaint I noticed that the payment gateway still seemed to be working I haven't had any fallout from red sis whatsoever so I can only assume they haven't done anything and they're still accepting payments from this scam organization but I figured that they might not respond to me since I'm not a victim so instead I emailed every one of the 686 victims an email to tell them how they had been scammed by this company the email included a suggestion about how to get their money back it wasn't easy emailing 600 plus people but I got a bit of help from LEEP who's also a fellow scam bidder I've left a link to his channel which is extremely interesting in the description on this video the early signs look promising I did hear back from one or two individuals to say that it is possible to get their money back but that they really have to fight for it let's hope that qtek BPO don't shut up shop very quickly and make a run with their earnings for the time being both websites oh mighty master comm on qtek BPO Diane are both live but of history is a named go by I suspected both of these websites may be taken down fairly quickly once this video goes live but that would be a very good thing I will not be able to get payments from anymore victims if you enjoy these videos and would like more exclusive content please check out my patreon pages there's a link in the description below if you wish to become a patron there's a link here as well so until an ex person decides to scam me keep safe
Info
Channel: Jim Browning
Views: 412,553
Rating: 4.9696479 out of 5
Keywords: qtechbpo, home it master, homeitmaster, kanpur, tech support scam, microsoft scam, scammer
Id: ygbkmh8brvo
Channel Id: undefined
Length: 17min 20sec (1040 seconds)
Published: Sun Jul 14 2019
Reddit Comments

Not entirely sure what I meant by the title but yea. People who hack hackers are pretty chaotic good right?

👍︎︎ 10 👤︎︎ u/Ramit110 📅︎︎ Jul 14 2019 🗫︎ replies

He's a hero. He's after scammers and trying to save the victims by hacking the scammer's PC and finding out who the victims are and contacting them

👍︎︎ 8 👤︎︎ u/Neepx 📅︎︎ Jul 14 2019 🗫︎ replies

Jim browning is the best, and all his videos are amazing. I love how competent and capable he is. I also love watching him foil scammers who are actively trying to scam other people l. This man is a hero

👍︎︎ 5 👤︎︎ u/Pramble 📅︎︎ Jul 18 2019 🗫︎ replies
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.