SCAMMERS CALL A CYBER SECURITY EXPERT AND ARE OWNED!

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
okay net which next your Navy do you guys OEM let me check it out computer right it's not that I created this [ __ ] from my end yeah I know that I know that I'm just I'm shocked that this is happening what's going on everybody says Probie with scammer and pay back your again I got a really fun video for you from one of our live streams not in the matrix or anything today we're actually talking with some scammers that want obviously steal some money from me but what if the victim was smarter than the scammer obviously as some of you guys know I work in cybersecurity so I know a lot of cybersecurity terms now in this video particularly I will bring up as many cybersecurity terms and use cases and technologies as I can to try to get the scammer of the tech support scammer as rile up as possible as nervous as possible and see if I can get them confused we had some fast in this one I hope you enjoy it turning the tables on the scammer so let's get into it hey James I had something said Windows security ie explorer.exe there's all this stuff like to call you guys up and it's like all capital letters I I'll be honest with you I kind of freaked out and turn the computer off but I don't I turned it back on I just want to call you guys because I hope that I'm you know not in trouble about it I just got this computer - okay and you know what what are you trying to do when you got this message I was just I just literally been trying to get on it you know I ESP you know stuff like that and as I can see right now the alert which you are getting a new computer because while browsing on the internet recently you got some infections due to that your Microsoft account has been blocked okay what would you say your name was Jim I'm just trying to remember James Peterson Oh James Peterson okay all right yeah I'm sorry I hope I didn't I hope I didn't get in any trouble or anything but I have to do I will go ahead and give you some instructions okay a next video computer Oh Martin yes then I will tell you what is the reason behind that exactly okay have a look on the keyboard on the left bottom corner side can you see there would be a Windows key that's the user in the bottom right a bundler on the keyboards bottom left yeah I see that yeah see the Windows key push that key and hold it down while holding down that key push the letter R arrays and Romeo at the same time now I believe you got a box on your screen now you need to type in that box I Explorer then help me like I'm helping you help me all together one wall heelp m e dotnet help me in Dartmouth okay help help me okay do I left click or a double click that one you will be able to see the ok option simply hit him but that's okay it says be cautious if you receive solicited requests to access your computer only join support sessions from people you recognize or Microsoft so I believe you are able to say establish support connection right oh yeah see there now you will get a yes option then you have a hit on yes how did you know how to do all this stuff because that's my job okay so you plugged on yes now you are connected with the servers you know let me see what is the error which you are getting a 10 year computer what happened on my screen it just went away yeah i minimized itself oh that was you doing any mind how do you do that because as I told you the go to a sister is a connection software with the help of that you are connected with our servers now now let me go ahead and see when you got that message at that point of time you are a Microsoft age or you are okay you are on Microsoft age you told me that you got you bought the brand-new machine when did you bought it I mean I literally just bought it last week I just bought it like last week ok left me yeah thank you for confirming it man you guys got a bunch of people in the background talking because we got hundreds of technician working under one roof you have hundreds goodness gracious so what I'm going to do I'm going to go ahead and check the infected file folders so I want you to have a look on the screen and let me know that if you recognize any one of the files which you are looking in a computer right now Oh what are all these I don't recognize any of this let me go ahead and try to open it any one of them no those are viruses don't open them those are viruses do not open that these are not the virus let me tell you first you can have a look what these files contain then I will tell you what exactly it is give me a second ok it's opening up what in the world is that what language is that yeah these are the foreign languages infected files when you browse on the internet they get in your computer because as I checked according to me being a technician as I check the protection status of your machine they do closes any external protection for your computer when you bought the computer my purchased machine learning next-generation anti-virus that we're supposed to be doing am whitelisting and a number of different other things as well every Microsoft computers required two things let me open the notepad so that I can explain you know second thing that is required by three Microsoft computer that is called net that will help you to protect your computer from the hackers so what I'm going to do so I'm going to go ahead and transfer this all to my level type techniques and they will answer your questions in a better way okay that's man my name is Peter sir I'm the senior technician on the floor how can I help you sir yeah hey Peter I was talking with what was his name what was that gentlemen's name James Peterson I was talking with him he's connected on to my computer and just wanted to you know I got a couple questions because we were talking through a couple different things and I was asking him about some of these file list powershell attacks that are happening you know they're using some Seavey's like some of the exploits with the the adobe flash exploit right I see ve 201 eight one five nine eight two and I think that might have been what happened because I there could have been an injection into the browser without me knowing because we're talking about a bunch of different anti viruses he was you've writing some down like a norton mcafee and some of the others but I don't think that whatever has happened on my computer could have been protected by an anti-virus and I was gonna ask what y'all's expertise was is I don't know I'm just going off of just you know some of my guessing I'll explain you how this IP address or do you know what is your IP address anyway what is my I don't even know what that is yeah what's what is an IP address if you look over here yeah I don't know what is that I don't live in North Carolina right see why this North Carolina because unfortunately the hackers are not really connected with your networking system see the report network sharing devices are you serious sir this is a report of your computer right it is not that I created this report from my end I know that I know that I'm just I'm shocked that this is happening yes I do sir but at this point of times here what do you need to do you have to activate the micro network protection sir right over here the problem is with your network and your right period because Israel compromised right are you kidding me the bottom line is sir what do you mean well it's a it's a saying have you never heard are you kidding me before it's when you're shocked like you don't understand that this is happening like you don't you never say that term yeah I know sir but that's what I'm explaining you right that's what I'm explaining you and whatever the report it is in front of you right okay yeah okay no it all makes sense and I appreciate you pulling the services up with all these things being stopped and I hope my questions have have you know I hope they make sense I apologize for asking so many edges this is just opening Pandora's Box for me you know so if you see if you want to activate this security if you want to secure your information basically you can subscribe to security for two-year five-year or the lifetime it's completely depends on you which how long you want to protect this protect your IP and their network sir yeah you guys sell the palo alto network for our walls yeah I want the PA 2200 fire or excuse me the PA 220 firewall if I could hear that will cost you somewhere around this is a price for the Fiesta okay does that include the Wildfire service that does the sandboxing yet so I could take I can take all the md5 hashes of every file on my system put it up in the wildfire and they can check to see if they're malicious or not and then come back okay perfect perfect okay so could you explain how the DLP works for your system though yes I can do that sir okay yeah tell me which license or shall we activate sir the two-year five-year or the like well I mean I'll do the lifetime one but I need to I need to know how you guys are the DLP can you can you speak to that how that system works DLP yes that will be that will be explained and let me explain you know explain you by the senior corps technician who want to work on the DLP sir okay yes can he get on and tell me about tell me about that real quick just I'm just curious how it works cuz I need to know about data at rest they didn't transit being able to encrypt email as I send it I'm like push button so like if I if I use outlook rat and I just push a button to encrypt the email before it gets in yes so for that sir what we're going to do we are going to activate a credential secure do you know what is the credential protection credential protection yeah yeah I got last lock yeah that is like DLF DLP okay it is like data loss prevention what does the protector will do it will secure your information password your data okay you know as perfect I agree perfect right so in that way we can secure each and every chaser so now we collide shall I call an activist or the two-year fighter of the life care monster I'd like to do the the lifetime if I can't I did just had one or a couple more questions if I could I'm sorry to you know ask all these are you fine with that I've asked you a couple more yeah go ahead okay so is there anything around mitre attack framework that you guys do to protect the miter kill chain it is this cloud hosting is this cloud hosted yes absolutely sir see did you see the special perfection right but is it AWS or is a Google cloud it's Google cloud okay okay and and you guys can you explain just a little bit just high level of the mitre attack framework that you guys work with I mean you are asking for the Google clouds you mean no I'm asking about the mitre attack framework and kind of how you guys align with the with the mitre attack framework if you could act that basically with the business computer is it a business computer or is it well I've got a small business I work at home yeah well it's gonna be a business computer that's what I'm asking because I that's why I'm asking about the data loss prevention and everything like that all right it's gonna be a business computer but till now it's not a business computer it's a personal computer right so you don't need that high-end security those security will be used only by those business people those who have this business only get ya do because I have people going after me and I'm telling you right so you can let me know which license we're gonna actual and accordingly we're gonna do all the needful for you sir okay yeah yeah I'll do the lifetime one so this is gonna come with AV is it gonna come with next-gen AV though yes okay which next-gen AV do you guys OEM let me check it out I mean if I can pick one I can give you know if I can pick one I mean I'm good with that or else if you've got whatever you guys recommend I just didn't know if you guys white labeled something or what see according according to my specialist okay because the technician which I considered this aid once you don't need those security that next and one wants this protection reactivated everything will be good to go sir okay yeah maybe is it Microsoft ATP you guys use no we'd only use that okay you don't use that okay so it's just straight up defender yeah okay okay because see you are using you are using a Windows 10 computer right the Windows 10 computer yes Windows 10 right so Windows micros you know if you talk about the founder it is most compatible with the Windows transcript no that's good I mean I is there anything around patching as well that you guys can help me with best practices to keep everything patched as far as like third-party patches like your you know Java Dobies you know Chrome all that is there an easier way to update all those because I try to update Windows 10 as much as I can right so see whatever need to be updated all always be done by the help of the code technician right but you to be done once I we assigned a technician for you and in order to assign a technician you tell me which license okay accordingly we're going to assign the technician will he be will he be using wsus for the update yeah they work it out and according they're gonna put whatever need to be done okay perfect because I need a little bit more streamlined process of updating especially third-party apps I mean you know right you know being in technology you obviously know right don't worry I'll send a technician for you whatever you know whatever the concern you have you can explain him and I'm gonna put all the need for you are you familiar one of the one of the last things are you familiar with any of the deceptive technologies that do essentially like the deception technology is like an elusive networks or something like that where essentially you know like say you get they put my kind of fake files out there so if you get like a ransomware that's gonna you know gonna spread and encrypt as many files as I can kind of put some fake files out there and they go after them and things like that do they have any of those deceptive technologies see you don't need that dispensing technology because that's an older system okay and that is especially for the cybercrime okay cybercrime uses those technology and since you are using Windows can you don't need that technology sure because okay how the networks are will be actuated everything will be good divorcer okay no that's good to know I'm good about that okay I'm just trying to I'm kind of going down the list of my mind real quickly is there anything else you think I'm missing no sir no see this this this tools will be activated as I said everything will be good along with the cell what I'll do we will provide you a direct call to number helpline number to you okay okay if you need any how any software any tension you can directly call them and the technician will be there for you to explain it out producer okay now my last thing is there any correlation so essentially I could pull logs from from all my systems my network I've got about 15 to 20 systems is there a way we could correlate logs together from all my systems and do a fit management you have any event management that you guys do like next generation where I could have a single let me can essentially have like a single single you know pain a class where I can go in and run queries against all the data from my systems I didn't know if you guys have something like that in there that will be integrated along with your network firewall protection right because I think that's not networks our protection we're gonna you know it's gonna protect all the devices that you're using under the same Webster okay so is that similar to like spank or proud system you know what is the cloud technology no can you explain that yes cloud technology is something where you are saving your data I mean according to you you are saving it on the computer okay but the fact is you are saving your data on to the Google cloud server right see if you save your data on computer there's this chance that anybody can get access of your information right right once your data will be saved onto the cloud there is no way that anybody in future can get access of any of your information sir okay but my so all my yeah all my data that goes up there is that multi-tenant or do I have my own allocated storage up there in the cloud is it multi-tenant though so are you familiar with multi-tenant oh yes see the data okay you you are you are putting the data on the computer even the computer along with that it will be saved on your cloud system mechanism right now I'm asking like so if you go down to the actual storage level you think about multi-tenancy right so if you're looking at like like a sand in my data let's say your data's good my tide is going up in clown and we're mixing all our data together because somebody gets maybe somebody hacks your account right but they got access into that storage they can get my information they can get my next-door neighbors everybody is like I mean is this a multi-tenancy cloud or do you think cloud information can be licked do you really think it's possible I don't think so actually Amazon got got hacked so yes I do believe that because oh no listen sir listen Amazon they're using their own cloud mechanism system that is well as here you know what as you're proud what's that about is it Easter is or West which has your west or east that technologies used by Amazon okay and that got compromised but not the Google cloud talking about Google cloud talking about net I mean apples how those those are more secure can nobody can compromise that sir because million of users using their technology sir so there is nowhere that anybody can compromise their cloud mechanism sir that's absolutely untrue well I've heard plenty of times s3 buckets getting compromised all the time I've heard about that's why I got nervous and you know again that's mild security especially when you start to think about containers and containerization and how to protect those containers and the data inside of them I mean that's a whole new world right there that's not even just virtualization that's not cloud you're talking containers containers security I think that and that's why I was asking right containerization is gonna always keep keep building keep building as we go on how we're gonna protect those is if my information is in a container hey sign me up you know what I mean sign me over there right now tell me which which license shall reactivation because I need to assign a technician for you so you need to let me know so I'm gonna go you really sold me on this I'm gonna go with the I'm gonna go with the last time to be honest if you want to be this perfection go ahead and feel of the information I know how are you tapping like that it's like every other word is like capital letters and then you know capital letters and the not capital letters you see that it's like oh cool that a different font or something I'm corrected for you don't worry about that okay now where the feel of the information sir please okay name the register Roy Miller I gotta put my phone number down absolutely so I need all the information for about Miller mail.com now you say do you want to go to the life care right yeah I wanna do a lifetime because I worked out a lifetime fitness that's kind of the same you know right right now Roy I request you for the payment please go ahead and grab your checkbook we have the check would handy with you yeah I got a check Andy on the check write down the name of the motion that is webmasters LLC masters LLC then put them out 1,000 yeah one thousand four hundred and ninety nine cents if you need to put the check on your future and turn on the printers so that I can take a scan of that sir oh I don't have a friend around the computer that you're using is a laptop or desktop desktop do you have the camera on this computer no I don't hang got a webcam I don't want people I want the Russians going in my computer no I'm gonna pull up the camera so I can put a check in front of it so I can take a snap of that sir okay why do you need a picture of the of the of the check I don't make no sense okay then then how are you give me the check information sir I'm gonna send it to you why would I what do you tell me you don't take pictures I mean how it works man yeah I got a I got a milieu to check what masters LLC I gonna mail it to you okay then you can you can do one thing sir okay you can mail the check but in order to register register you you need to give me the information sir okay I need your name on the account the name that is mentioned on your check then you could put the routing number you have to put the account number and put the check number routing in the check number why would I give you my dang routing number serve me are you paying this amount listen are you paying this amount are you agree with the security yes I want to get a security man what are you talking about if you want to get a security girl listen I'm not talking you are talking okay I'm asking you if you want to get the security then in order to register security up to give me the information are you agree to do that I don't know if I am ready so okay then you can do one thing work just take your time think about that if you make your mind if you think yes I need this security again you can give us a call back okay are you kidding me you understand what I mean I'm not kidding you are you excited so you you keeps repeating say what three times that I'm kidding you I think you are kidding me I think this is a whole elaborate scheme you want me to give you my routing information in my checking and then biking and all this stuff you got to be kidding me okay by giving that information what do you think I mean we're gonna steal your money from your that column I would say exactly yes I'd say exactly that right right now I understand what sort of like what is your thinking right I mean I'm with you your time like you are wasting my time okay you're exactly right I am wasting your time let me get out of the computer hallo sir oh okay you're gonna lock me out no I'm just get out of your computer I know are you in Kolkata - are you in Kolkata what I'm sorry are you in Kolkata oh you're on Park Street because now you are in tell Carla what is okay you're in Kolkata you're a scammer aren't you I mean is it a name you're a scammer aren't you so what do you mean like haha you're in Park Street aren't you you're in a which sector UN are you in sector five we're in Princeton New Jersey oppress the New Jersey I don't think you're in u.s. you are Kelly you're in Alabama but I don't think you're in I believe you're in somewhere from you know I don't know what what did you do to my computer what'd you do to my computer how come it's how come it's all messed up now sir I already get out of your computer yeah but you messed up our computer you messed up my computer now no sir stop blaming me sir you mess my computer I'm not I'm not I do computer Saturday our Garfield computer in the password doesn't work so anything else I can do today no please please fix my computer please I'm sorry please no please fix my computer please I didn't I didn't mean it I thought I was being silly please just fix it like put it back the way it's supposed to be please please just give me the information fix it please give me the password I just got this computer please fix it please can you fix [ __ ] computer I'll give you gift cards or whatever it is you need man please I Love You Man please I'll give you a gift cards I'll go to the store and get them right now I'll give you a subway gift cards I know you're probably fat and ugly and you'd love a Subway sandwich wouldn't you please man I know you're still on there listening to me you won okay I give up you won please fix my computer go on the naughty list scammer there you have it folks hope you enjoyed this video I think I'm gonna start doing this a little bit more some of these scammers throwing out some technical terms really hope you enjoyed it if you're new to the channel check out some of these videos where we delete files of scammers computers it's really really funny thank you so much have a good one
Info
Channel: Scammer Payback
Views: 249,664
Rating: 4.9319406 out of 5
Keywords: scam, scammer, scambait, prank, check, computer, gift cards, internet scam, computer scam, tech support scam, location, scambaiting, india, tech, angry, call center, trolling, scammer prank, fake customer support, hacker, scammer trolling, smart, computer hack, money, scamming, illegal scammers, 2020 scams, prank call, granny
Id: yKShx2vzBpo
Channel Id: undefined
Length: 25min 4sec (1504 seconds)
Published: Tue Mar 03 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.