top of page

Windows Remote Control Application (Quick Assist) being Exploited by Scammers!

Recently, Microsoft's security team uncovered a concerning trend. A group known as Storm-1811 has been exploiting the Quick Assist tool to deceive users. Storm-1811's primary aim is financial gain through online scams.


What You Need to Know:

The scam begins by impersonating trustworthy figures over the phone. They then manipulate victims into granting access to their computers using Quick Assist. Once inside, they wreak havoc-installing harmful software or even encrypting files until a ransom is paid.


Watch Out for These Signs:

- Unexpected Offers: Stay wary of unexpected offers for remote assistance. Legitimate support requests are usually user-initiated.

- Pressure Tactics: Be cautious of urgent demands, especially those claiming immediate action is needed. Take the time to verify before granting access.

- Suspicious Communication: Stay vigilant for unexpected phone calls or emails requesting remote assistance. Always verify the sender's identity before proceeding.


Protective Measures for Businesses:

- User Awareness: Educate your team about scam tactics and the risks associated with granting remote access. Encourage scepticism and verification before acting.

- Access Controls: Limit Quick Assist usage to authorised users to prevent misuse. If Quick Assist isn't a standard tool for your business, consider blocking it altogether.

- Reporting Suspicious Activity: Promptly report any suspicious or unexpected requests for remote assistance. This can prevent others within your organisation from falling victim to the same scam.


Closing Thoughts: Defending Against Quick Assist Scams

In the realm of cybersecurity, simplicity reigns supreme. While user awareness plays a crucial role in defense, technical controls are equally vital.

By educating your team and implementing technical controls to limit Quick Assist usage or block it altogether, you create a robust defence against these types of scams. Remember, a combination of user vigilance and technical safeguards is the most effective way to protect your business from Quick Assist scams and similar threats.

Recent Posts

See All
Beware of public mobile phone charging stations

You know that feeling when your phone is running on empty, and you spot a convenient charging station at the airport or in a hospital waiting room? Before you plug in, let's talk about hashtag#JuiceJa

 
 
 

Comments


Follow Us:

  • Facebook
  • Linkedin

Click IT Solutions© 2026

bottom of page