Offshore Outsourcing & Scammer
Blog about offshore outsourcing and scammer in the outsourcing industry
Tech Support Scammer - Pashin Infotech Pvt. Ltd. - Pintu Singh - likes to get rich quick by scamming
by Rudolf Faix Sunday, January 31, 2016 10:14 AM

Facebook logo from Pashin Infotech Private LimitedPashin Infotech Pvt. Ltd. is an in Liulah, India registered company. Pashin Infotech Private Limited seems to be not successful in their business and for this reason they are trying to make money with fraud. They are offering a Tech Support campaign which is a plain scam and full of lies. The provided domain mscorp-payment.com at their Facebook page got already deleted. The scammer, director Pintu Singh seems have to been so stupid to use the name of Microsoft (mscorp) in his domain name. Such domains have a very short expiration time. As soon the first complaints are coming up and that happens by Tech Support Scam very fast, the domain gets deleted from the authorities.

It seems that Pashin Infotech failed with their own Tech Support strategy at the beginning of the year 2014 because their last entry at their Facebook page is from February 18, 2014. It seems to be easier for their director Pintu Singh to scam others than to work on their own campaign. Everybody can get it how difficult it is to sell Tech Support by cold calls. Nobody gives up a business where he is earning good! For this reason the scammer Pintu Singh got the idea that others should pay to him for getting his scam campaign. The worst case that can happen is that the center owner pays for going to jail.

That scammer are even too lazy to type a email message can get shown in the from a call center forwarded email with the attached script:

From: Pashin Solutions [mailto:pashinsolutions@gmail.com]
Sent: Thursday, January 28, 2016 10:31 AM
Subject: Tech Support Script

PFA

--

Thanks & Regards,

 

Pintu Singh

Managing Director

Pashin Infotech Private Limited

+918100266097

Attachment:
Tech-Support Script.doc

I have copied the content of the script here, but you can download the word document from the link Tech-Support Script.doc too. The campaign requires three different agents. The one agent which is cold calling, a supervisor and an agent which makes the verification with the victim. This campaign can get started from everybody and he even don't need to pay the scammer Pintu Singh from Pashin Infotech because Pintu Singh or Pashin Infotech is not providing anything. By taking a look at the following script you'll see that this campaign is nothing else than an outbound scam system. Why do you need to pay a scammer?

The agent's script shows that this campaign is a plain outbound campaign. You can even not be sure that the called one owns a computer or a device with Internet connection:

Agent’s Script:

Hi! This is ……………. And I am calling you from the computer technical department ‘FOR ‘Universal Pc Care’

How r u doing today?

This call is in regards to your computer as we have been receiving some errors report and warning messages from your computer to our centralized server and its indicating that your computer has some harmful malicious files with malwares and spywares. Are you aware of that?

Yes or No (Customer).

You are not aware of these harmful viruses and malware which is getting downloaded in your computer just because of those infections are hidden in nature, which is why your Antivirus is also not able to detect that.

And they keep getting into your computer and corrupt the hard drive and mother board of your computer and taking your computer to the verge of getting crashed, and also you are not getting update of these infections just because the security system of your computer has also been compromised.

So is your computer on right now, so that I can show you the problems which are there in your computer and you would be able to see them right now.

Look at the left -hand side bottom corner of your keyboard you would find a CTRL key and just beside that there would be a 4 flagged windows key / start key. Press the windows key and the alphabet R key (R as in roger) both at the same time (simultaneously) and you will find a small dialog box appearing at the extreme left-hand side of your computer screen named “Run”. Then you will find a ‘white bar’ beside ‘open’. Now in that white bar type in ‘eventvwr’ (explain using phonetics) and then click on ‘Ok’ or press ENTER. Can you see a new window as ‘EVENT VIEWER’? And at the left hand side of the box you will find event viewer local and there would be a sub option of windows log/ application, security, system. If it comes as window log so double click on windows log you would be getting an option as application security, setup, system just below windows log, now double click on ‘application’ and then you would find list of events which will have blue “I” as information, Red circled errors and yellow triangular icon as a warnings. Now slowly, just scroll down the page and give me a rough count how many errors and warnings are there?

Now again on the left hand side of the page you will find an option ‘system’ under windows log.

This is the system log of the computer Just give a double left click on system and again you would find a list of information, errors and warnings. So just scroll down the page and let me know how many red errors and yellow warnings are there?

Now do you have an idea what these errors and warning are? And how come these get into your computer….

Whenever you are going to Google and when you click on any search suggestions by google or when you surf any social networking sites like YouTube and face book by mistake or accidently your computer tends to download unwanted and harmful files and once these files gets into your computer they keep multiplying them and thereby harming your computers motherboard and slowly corrupts it, thereby it acts like a slow poison for it.

Your Computer then sends Error reports and messages to our centralized server which is specially developed by our technical team as a receptor so that we can retrieve them and find out from it is coming, with the help of the IP address we can figure out the Geographical location of the computer or laptop and then with the help of the geographical location we derive the street address and then we figure out the phone numbers associated with it and then we give a call, only when we see that the issue requires your immediate attention.

Okay, so right now what I will transfer this call to one of our senior technician who will explain you further about this problem of your computer.

We can see that the scam starts already in the third sentence. For such calls you don't need a scammer like Pintu Singh from Pashin Infotech. As this guy is a notorious scammer he will scam you too and not only the called computer users. You cannot trust such a criminal for this reason you need to have your own payment processor. Please remember that nobody will give you money as a gift. Everybody is hard working for his money and does not have more than he needs to survive.

A scammer, which is making such stupid calls need to put into jail and the key to his cell needs to get thrown away. In such a case are the call centers the scammers and creatures like Pintu Singh the instigator or ringleader. In any case as long as the Indian authorities are only interested in making money from their own corruption the reputation of the whole country will go down to a country of scammers. Isn't it a nice outlook for the future? As longer it takes until every real businessman does not take action against the scammers as harder it will be it for him to make a real, legit and genuine business in the future. It does not help anybody if the CEO from Google is an Indian. One rotten apple spoils the whole barrel!

Let's come back to the Technical Support Scam offered from Pintu Singh - Pashin Infotech. As next we read how the supervisor needs to continue the scam:

Senior Supervisor’s Script:-

Hi my name is _________and I am the senior technician. How are you doing today? I believe my agent has shown you the errors and the warnings in the application and system logs of your computer? Do you have any idea what these errors and warnings are? Well they are just a sign that your computer has been badly corrupted and it is full malware and spyware that requires your immediate action. I believe that you know that whenever you buy a computer you get a warranty. And you know that warranty comes with a limited time period of one year. So as you have using this computer from the past ‘X’ no. of years. So the software maintenance warranty of your computer has expired. That’s the reason all the software’s present in your computer and the anti-virus is not working properly and not protecting your computer from these malicious files. These malicious files are so small and hidden in nature that in spite of having anti-virus on your computer, your computer is still getting infected by these malicious files which you yourself can see with your eyes. These malicious files keep on multiplying in numbers and corrupt the boot sector and the hard-drive of your computer. And once it completely gets blocked then your computer might crash down. And I believe that you don’t want your computer to crash down. Right?

So what I will do right now is that I will get you connected to one of our certified technician who will fix up all your problems and will also install all the required software’s to protect your computer so that in the coming future your computer will be absolutely safe and secure and your computer will not crash down. The service provided by the technician and the software’s that out technician will be installing on your computer will be absolutely free but in order to activate the software maintenance service on your computer you need to pay only a one- time payment of _________dollars/pounds for _________no. of years. And in that coming long________ no. of years if you do face any problems with your computer or if you require any software’s for your computer it will be provided to you free of cost within this extended warranty period. You don’t have to pay for that again and again.

Now close down everything and come down to the main screen of the computer and click o n to the internet explorer so that I can connect yourself to one of our certified technician, now once you get the internet page on the screen in the address bar you just need to type in www.logmein123.com and hit enter, now you will see in the next page support connection enter your six digit code so just bare with me I’ll be generating a trail code for you so that connect yourself to the technician…and your six digit code would be 123456 now click on connect to technician…now you will get an option RUN so click on that and again you need to click on RUN so click on again…now you just need to click on every positive options like allow, ok, continue…now you have been successfully connected to one of our certified technician.

Just hold on now I will ask my technician to send you the registration form on your computer screen which you need to fill from your side. You don’t have to provide me any of your personal information or the card numbers to me over the phone. If you have printer in your home then you can take the print out of the receipt after making the payment and you will also get the invoice ant the order no. in your e-mail as well.

LogMeIn is a service and has is not responsible for the scam itself, only their service is getting used for the scam. LogMeIn Inc. gets traded at the NASDAQ. At the Better Business Bureau Boston we can find during the last three years 88 complaints and 31 customer reviews from which is only one positive. I wonder why the CEO from LogMeIn Inc. does not give an oder to make their product more secure? Are they afraid that they would lose some customers, which are only scammer? Is he an Indian too and does he like to help his compatriots in scamming innocent computer users?

After the scam action from the supervisor the victim shall confirm that everything is OK. The only problem is that even if the answer from the victim is that he does not have some problems now that the recording will not help in front of the law court. I think this action should only soothe the conscience of the agents for the case they have something what normal people are calling conscience:

VERIFICATION SCRIPT

Hi this is …….. And I m from the verification department, how are you doing today?

Well, the purpose of this transfer is to check or confirm that you were not pressurized or misled at any point of time.

  1. So can you confirm to me “Was the agent polite and courteous with you?”
  2. Did he explain you what exactly the issues were in your computer or was he just rushing through with what he had to say?
  3. Did you at any point of time hand over any of your card information or your Banking details over the phone?
  4. Please be aware that we are not a part of Microsoft and that we are an independent service provider for windows and MAC operating computers
  5. Now you can let the computer be on and leave the controls and once the work of the technician will be completed you will be informed about the same with a message on the computer screen.
  6. Do you have any more questions for me?
  7. So it was pleasure talking to you, thank you for your time and patience and take care of yourself.
  8. Bye Bye.

Not only these ones, which are participating at the scam system, are making themselves guilty, these ones, which are knowing about the scam and do nothing against it, are the same way guilty like the scammers itself!

Everybody should think about an old prophecy from the Cree (native Americans): "When the last tree is cut down, the last fish eaten, and the last stream poisoned, you will realize that you cannot eat money."

 

Filter by APML

Follow me

AboutMe

I'm since more then 35 years in the computer business (programming and technical support) and using the Internet since it has started. Since 2002 I'm programming solutions for Asterisk and since 2004 I'm in the call center industry.

Disclaimer

All data and information provided on this site is for informational purposes only. I make no representations as to accuracy, completeness, currentness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use. All information is provided on an as-is basis and is only representing my own opinion. By browsing or using content from this site you accept the full legal disclaimer of this website.