GoTo Customer Support Embark: GoTo Admin Training Embark: GoTo User Training Provide Feedback

Attack Description

First we'll look at the kind of attack, and an example scenario, and then we'll explore how to protect yourself from this kind of attack in Rescue.

Let's start with one of the most common kinds of scams:

The Attack: Your employees or customers get approached by scammers proactively, pretending to be you​ 

Example

  • An employee gets a phone call from someone claiming to be your IT team. ​ 
  • Unfortunately, it is not IT, but someone trying to steal info from the corporate network. ​ 
  • Since the employee believes them, they download the Rescue applet and now the malicious actor has control of the system. ​