Offshore Outsourcing & Scammer
Blog about offshore outsourcing and scammer in the outsourcing industry
Tech Support Scammer - Pashin Infotech Pvt. Ltd. - Pintu Singh - likes to get rich quick by scamming
by Rudolf Faix Sunday, January 31, 2016 10:14 AM

Facebook logo from Pashin Infotech Private LimitedPashin Infotech Pvt. Ltd. is an in Liulah, India registered company. Pashin Infotech Private Limited seems to be not successful in their business and for this reason they are trying to make money with fraud. They are offering a Tech Support campaign which is a plain scam and full of lies. The provided domain mscorp-payment.com at their Facebook page got already deleted. The scammer, director Pintu Singh seems have to been so stupid to use the name of Microsoft (mscorp) in his domain name. Such domains have a very short expiration time. As soon the first complaints are coming up and that happens by Tech Support Scam very fast, the domain gets deleted from the authorities.

It seems that Pashin Infotech failed with their own Tech Support strategy at the beginning of the year 2014 because their last entry at their Facebook page is from February 18, 2014. It seems to be easier for their director Pintu Singh to scam others than to work on their own campaign. Everybody can get it how difficult it is to sell Tech Support by cold calls. Nobody gives up a business where he is earning good! For this reason the scammer Pintu Singh got the idea that others should pay to him for getting his scam campaign. The worst case that can happen is that the center owner pays for going to jail.

That scammer are even too lazy to type a email message can get shown in the from a call center forwarded email with the attached script:

From: Pashin Solutions [mailto:pashinsolutions@gmail.com]
Sent: Thursday, January 28, 2016 10:31 AM
Subject: Tech Support Script

PFA

--

Thanks & Regards,

 

Pintu Singh

Managing Director

Pashin Infotech Private Limited

+918100266097

Attachment:
Tech-Support Script.doc

I have copied the content of the script here, but you can download the word document from the link Tech-Support Script.doc too. The campaign requires three different agents. The one agent which is cold calling, a supervisor and an agent which makes the verification with the victim. This campaign can get started from everybody and he even don't need to pay the scammer Pintu Singh from Pashin Infotech because Pintu Singh or Pashin Infotech is not providing anything. By taking a look at the following script you'll see that this campaign is nothing else than an outbound scam system. Why do you need to pay a scammer?

The agent's script shows that this campaign is a plain outbound campaign. You can even not be sure that the called one owns a computer or a device with Internet connection:

Agent’s Script:

Hi! This is ……………. And I am calling you from the computer technical department ‘FOR ‘Universal Pc Care’

How r u doing today?

This call is in regards to your computer as we have been receiving some errors report and warning messages from your computer to our centralized server and its indicating that your computer has some harmful malicious files with malwares and spywares. Are you aware of that?

Yes or No (Customer).

You are not aware of these harmful viruses and malware which is getting downloaded in your computer just because of those infections are hidden in nature, which is why your Antivirus is also not able to detect that.

And they keep getting into your computer and corrupt the hard drive and mother board of your computer and taking your computer to the verge of getting crashed, and also you are not getting update of these infections just because the security system of your computer has also been compromised.

So is your computer on right now, so that I can show you the problems which are there in your computer and you would be able to see them right now.

Look at the left -hand side bottom corner of your keyboard you would find a CTRL key and just beside that there would be a 4 flagged windows key / start key. Press the windows key and the alphabet R key (R as in roger) both at the same time (simultaneously) and you will find a small dialog box appearing at the extreme left-hand side of your computer screen named “Run”. Then you will find a ‘white bar’ beside ‘open’. Now in that white bar type in ‘eventvwr’ (explain using phonetics) and then click on ‘Ok’ or press ENTER. Can you see a new window as ‘EVENT VIEWER’? And at the left hand side of the box you will find event viewer local and there would be a sub option of windows log/ application, security, system. If it comes as window log so double click on windows log you would be getting an option as application security, setup, system just below windows log, now double click on ‘application’ and then you would find list of events which will have blue “I” as information, Red circled errors and yellow triangular icon as a warnings. Now slowly, just scroll down the page and give me a rough count how many errors and warnings are there?

Now again on the left hand side of the page you will find an option ‘system’ under windows log.

This is the system log of the computer Just give a double left click on system and again you would find a list of information, errors and warnings. So just scroll down the page and let me know how many red errors and yellow warnings are there?

Now do you have an idea what these errors and warning are? And how come these get into your computer….

Whenever you are going to Google and when you click on any search suggestions by google or when you surf any social networking sites like YouTube and face book by mistake or accidently your computer tends to download unwanted and harmful files and once these files gets into your computer they keep multiplying them and thereby harming your computers motherboard and slowly corrupts it, thereby it acts like a slow poison for it.

Your Computer then sends Error reports and messages to our centralized server which is specially developed by our technical team as a receptor so that we can retrieve them and find out from it is coming, with the help of the IP address we can figure out the Geographical location of the computer or laptop and then with the help of the geographical location we derive the street address and then we figure out the phone numbers associated with it and then we give a call, only when we see that the issue requires your immediate attention.

Okay, so right now what I will transfer this call to one of our senior technician who will explain you further about this problem of your computer.

We can see that the scam starts already in the third sentence. For such calls you don't need a scammer like Pintu Singh from Pashin Infotech. As this guy is a notorious scammer he will scam you too and not only the called computer users. You cannot trust such a criminal for this reason you need to have your own payment processor. Please remember that nobody will give you money as a gift. Everybody is hard working for his money and does not have more than he needs to survive.

A scammer, which is making such stupid calls need to put into jail and the key to his cell needs to get thrown away. In such a case are the call centers the scammers and creatures like Pintu Singh the instigator or ringleader. In any case as long as the Indian authorities are only interested in making money from their own corruption the reputation of the whole country will go down to a country of scammers. Isn't it a nice outlook for the future? As longer it takes until every real businessman does not take action against the scammers as harder it will be it for him to make a real, legit and genuine business in the future. It does not help anybody if the CEO from Google is an Indian. One rotten apple spoils the whole barrel!

Let's come back to the Technical Support Scam offered from Pintu Singh - Pashin Infotech. As next we read how the supervisor needs to continue the scam:

Senior Supervisor’s Script:-

Hi my name is _________and I am the senior technician. How are you doing today? I believe my agent has shown you the errors and the warnings in the application and system logs of your computer? Do you have any idea what these errors and warnings are? Well they are just a sign that your computer has been badly corrupted and it is full malware and spyware that requires your immediate action. I believe that you know that whenever you buy a computer you get a warranty. And you know that warranty comes with a limited time period of one year. So as you have using this computer from the past ‘X’ no. of years. So the software maintenance warranty of your computer has expired. That’s the reason all the software’s present in your computer and the anti-virus is not working properly and not protecting your computer from these malicious files. These malicious files are so small and hidden in nature that in spite of having anti-virus on your computer, your computer is still getting infected by these malicious files which you yourself can see with your eyes. These malicious files keep on multiplying in numbers and corrupt the boot sector and the hard-drive of your computer. And once it completely gets blocked then your computer might crash down. And I believe that you don’t want your computer to crash down. Right?

So what I will do right now is that I will get you connected to one of our certified technician who will fix up all your problems and will also install all the required software’s to protect your computer so that in the coming future your computer will be absolutely safe and secure and your computer will not crash down. The service provided by the technician and the software’s that out technician will be installing on your computer will be absolutely free but in order to activate the software maintenance service on your computer you need to pay only a one- time payment of _________dollars/pounds for _________no. of years. And in that coming long________ no. of years if you do face any problems with your computer or if you require any software’s for your computer it will be provided to you free of cost within this extended warranty period. You don’t have to pay for that again and again.

Now close down everything and come down to the main screen of the computer and click o n to the internet explorer so that I can connect yourself to one of our certified technician, now once you get the internet page on the screen in the address bar you just need to type in www.logmein123.com and hit enter, now you will see in the next page support connection enter your six digit code so just bare with me I’ll be generating a trail code for you so that connect yourself to the technician…and your six digit code would be 123456 now click on connect to technician…now you will get an option RUN so click on that and again you need to click on RUN so click on again…now you just need to click on every positive options like allow, ok, continue…now you have been successfully connected to one of our certified technician.

Just hold on now I will ask my technician to send you the registration form on your computer screen which you need to fill from your side. You don’t have to provide me any of your personal information or the card numbers to me over the phone. If you have printer in your home then you can take the print out of the receipt after making the payment and you will also get the invoice ant the order no. in your e-mail as well.

LogMeIn is a service and has is not responsible for the scam itself, only their service is getting used for the scam. LogMeIn Inc. gets traded at the NASDAQ. At the Better Business Bureau Boston we can find during the last three years 88 complaints and 31 customer reviews from which is only one positive. I wonder why the CEO from LogMeIn Inc. does not give an oder to make their product more secure? Are they afraid that they would lose some customers, which are only scammer? Is he an Indian too and does he like to help his compatriots in scamming innocent computer users?

After the scam action from the supervisor the victim shall confirm that everything is OK. The only problem is that even if the answer from the victim is that he does not have some problems now that the recording will not help in front of the law court. I think this action should only soothe the conscience of the agents for the case they have something what normal people are calling conscience:

VERIFICATION SCRIPT

Hi this is …….. And I m from the verification department, how are you doing today?

Well, the purpose of this transfer is to check or confirm that you were not pressurized or misled at any point of time.

  1. So can you confirm to me “Was the agent polite and courteous with you?”
  2. Did he explain you what exactly the issues were in your computer or was he just rushing through with what he had to say?
  3. Did you at any point of time hand over any of your card information or your Banking details over the phone?
  4. Please be aware that we are not a part of Microsoft and that we are an independent service provider for windows and MAC operating computers
  5. Now you can let the computer be on and leave the controls and once the work of the technician will be completed you will be informed about the same with a message on the computer screen.
  6. Do you have any more questions for me?
  7. So it was pleasure talking to you, thank you for your time and patience and take care of yourself.
  8. Bye Bye.

Not only these ones, which are participating at the scam system, are making themselves guilty, these ones, which are knowing about the scam and do nothing against it, are the same way guilty like the scammers itself!

Everybody should think about an old prophecy from the Cree (native Americans): "When the last tree is cut down, the last fish eaten, and the last stream poisoned, you will realize that you cannot eat money."

 

Be careful with the instant message that crashes iPhones and iWatch
by Rudolf Faix Sunday, May 31, 2015 4:21 AM

Newfound iOS bug triggers wave of instant messages that causes iDevice reboot loop.

iWatchThere's yet another iOS bug that causes Apple gadgets to crash when they get instant messages containing a string of extraordinary characters. With further finessing, the same endeavor may have the capacity to assault Macs, since OS X is likewise not able to process the same mix of characters, which are in fact known as glyphs.

As indicated by individuals researching the bug on reddit, the content reasons iPhones running different variants of iOS to expeditiously crash. A whirlwind of Twitter clients, irate that their gadgets succumbed to instant messages, demonstrates that the bug is bringing on issues. Apple will in all likelihood issue a fix. Meanwhile, clients can secure themselves against the irritation message by going to framework settings, exploring to Notifications>Messages>Show Previews, and switching it to off. 

iPhoneThat change will forestall assaults that are as of now coursing on the web, yet it may not prevent scoundrels from discovering better approaches to crash individuals' iDevices. As per reddit the string messages sent over WhatsApp might likewise trigger the accident. What's more, contingent upon the way individual applications parse Unicode glyphs, different projects may do likewise. The bug can likewise trek up OS X, in spite of the fact that the assault obliges an objective to connect or glue a malevolent record into the Mac terminal, as indicated by an analyst who passes by the Twitter handle Hacker Fantastic.

Programmer Fantastic has tweeted a mixture of other fascinating specialized points of interest. The bug, he reported, lives in a piece of the working framework that procedures Unicode glyphs and reasons a string to be composed to a specific memory area. The bug is fixed to the way flag warnings process Unicode, reddit user sickestdancer98 reported. The pennant is not able to show the content and in the long run crashes the whole OS. 

While the bug is legitimately viewed basically as an aggravation, refusal of-administration vulnerabilities can frequently be the consequence of genuine defects that, with more work, can be misused to perform code-execution assaults. Furthermore, notwithstanding when more vindictive adventures aren't conceivable, DoS openings can infrequently show open doors for blackmailers or individuals hoping to upset huge occasions for occurrence individuals at a meeting. Anticipate that Apple will discharge a patch in the advancing week or somewhere in the vicinity.

 

Tags: , , , , ,

Security

SCAM about died bank customers with millions on their accounts
by Rudolf Faix Tuesday, March 10, 2015 2:47 AM

Today (2015-03-09) I got a LinkedIn message, which shall make me rich. I think that other members from LinkedIn have gotten a similar message with the following content:

Ms Rose LEE Wai Mun

Hello

Ms Rose LEE Wai Mun

9. März 2015, 11:33 Uhr

First thanks for accepting my Invitation on LinkedIn, I hope My message meets you in good health. It's my pleasure to introduce myself via this means. I am Ms Rose LEE Wai Mun, Vice-Chairman and Chief Executive With Hang Seng Bank Corporation Limited, I am responsible for all areas relating to accounting functions and financial reporting. 
I have business proposal to share with you, Write to me on my private email, msroselewaimun@gmail.com to discuss in Details. 
I apologize if you find this arbitrary and irrelevant. 
Regards, 
Ms Rose LEE Wai Mun

 

As I expect a scam about a long laying fund there I have answered the message to the given email address and expect now a story about a missing customer with millions of $ on a bank account, which has the same last name like me. For showing this to you, I have sent a short answer to the given email address:

Rudolf Faix <rudolffaix@gmail.com>

11:40
 
an msroselewaimun
 
 
 
 
Hi Rose
 
Please send me the details about your business proposal.
 
best regards
Rudolf Faix

 

2015-03-10

Like I have expected it yesterday, I have received such an email. Don't take the bait. The next follow up will be the advance fee scam.

Ms Rose LEE Wai Mun

23:45 (vor 1 Stunde)
 
an mich
 

 
 
 
Dear Faix
 
Thanks so much for replying to my email address, I know this will come as a surprise to you but let me formally introduce myself to you.I am Ms Rose LEE Wai Mun Vice-Chairman and Chief Executive at the Hang Seng Bank Plc. I am contacting you concerning an abandoned sum of $22,500,000.00 USD. In June 2004, A customer called Fernando Faix foreign contractor with Royal Dutch Plc came to our bank for business discussions and investment, As the officer in charge of his transaction then, I encouraged him to consider various growth of funds with prime ratings. Then he invested Nineteen Million Five Hundred Thousand United State Dollars only. Based on my advice, we were able to spin the initial deposit with profit and interest to 22.5 million U.S Dollars. After few months; My bank (Hang Seng) sent several notice to him without response and unfortunately, my client died in a car crash along with his nuclear family at France while on sabbatical in the summer of 2008, may their soul rest in peace. He died without leaving a Will and several efforts were made to find his extended family through your embassy without success. Because of the sensitive nature of private banking, most customers don't nominate next of kin in their investment, also usually in most cases leave their WILLS in our care, in this case; our now deceased client died in-testate.
 
It is quite clear now that our dear client died with no known or identifiable family member. According to practice, the Private banking sector will by the end of this year broadcast a request for statement of claim to Hang Seng Bank Ltd, failing to receive viable claims they will probably revert the deposit to the Management of Hang Seng Bank Ltd. This will result the money entering the Hang Seng accounting system and the portfolio will be out of my hands and out of the private banking division. What bothers me most is that according to the laws of my country at the expiration of Ten {10} years the funds will revert to the ownership of the Hong Kong Government if nobody applies to claim the funds.
 
Now, I am prepared to give the necessary details to you as the closest surviving relation of our deceased customer (Fernando Faix). I am also proposing that after a successful execution of the business deal, the funds will be shared in the ratio 40/60. You will get 40% and I will be entitled to 60% as the initiator of the deal. You know that I must have done my home work already before contacting you. Although the project is capital intensive, I know I will be able to pull it through following proper banking and legal Channels with your assistance at your end. I will tidy up the legal aspect with the assistance of a lawyer who will prepare all the documents that will be needed to transfer the money from Hong Kong to your country. Once more, I ask that if you find no interest in this project that you should discard this mail and forget I ever contacted you, I ask that you do not be vindictive and destructive; do not destroy my career. Opportunities like this only comes once in a lifetime. I am a family woman and this is an opportunity for me to give my family the best in life. I would want you to think about this and let me know your decision. If you give me a positive response, I will give you the relevant INFORMATION for the successful transfer of these funds and we both enjoy it in peace.
 
If you give me positive signals on my email: msroselewaimun@gmail.com, I will initiate this process towards a conclusion. I wish to inform you that should you not contact me via official Channels else I will deny knowing you and about this project. You can also check on my biography from this link as well http://bank.hangseng.com/1/2/about-us/directors-organisation/board-of-directors#irenelee you can also call our official line +852-2822-0228 but do not talk about this transaction or I may deny knowing you, when you call? Ask of Ms Rose LEE Wai Mun (Hang Seng Bank) and if I am on seat, then your call shall be transfer to me, what I will want you to do is to abolish the call before I talk because my official line are not secured means to reach me bearing in mind, the nature of this transaction, because they are periodically monitored to assess our level of customer care in line with our Total Quality Management.
 
I await your response.
 
Regards

 

I stop at this time the communication with this scammer. The follow up will be only an advanced fee scam.

For the case that such a email would not be only scam, you would make yourself punishable and will end up in jail for helping in betraying the government, which gets in such case the heritage. 

 

Tags: , , , , , , , , ,

Scammer Exposed

Ex-Mesa mortgage company employee gets prison in fraud case
by Rudolf Faix Saturday, February 14, 2015 9:35 AM

A former Mesa mortgage company employee has been sentenced to a year in federal prison for helping his older brother commit mortgage loan origination fraud.

Prosecutors say 35-year-old Kevin Grant Lee also was sentenced to five years of supervised release.

Last year, 46-year-old Scott Thomas Lee received a five-year prison term followed by five years of supervised release.

The brothers previously pleaded guilty to conspiring together and with others to commit mortgage fraud involving high-end residential loans and custom-home construction loans leading up to the real estate crash of 2008.

Both men also were ordered to pay millions of dollars in restitution to lenders.

Prosecutors say Scott Lee formerly owned Summit Capital Mortgage. They say he and the company received nearly $1.5 million in commissions based on the bogus loans.


Source: http://workforceverification.com/2015/02/13/ex-mesa-mortgage-company-employee-gets-prison-in-fraud-case/


 

Tags: , ,

Blog Rudolf Faix

Filter by APML

AboutMe

I'm since more then 35 years in the computer business (programming and technical support) and using the Internet since it has started. Since 2002 I'm programming solutions for Asterisk and since 2004 I'm in the call center industry.

Disclaimer

All data and information provided on this site is for informational purposes only. I make no representations as to accuracy, completeness, currentness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use. All information is provided on an as-is basis and is only representing my own opinion. By browsing or using content from this site you accept the full legal disclaimer of this website.