02-347-7730  |  Saeree ERP - Complete ERP Solution for Thai Organizations Contact Us

Fake IT Support — Social Engineering

Fake IT Support — A New Social Engineering Tactic
  • 4
  • March

In March 2026, Huntress (a cybersecurity firm) revealed a new attack pattern found in 5 or more organizations — hackers send thousands of spam emails to flood the target's inbox, then follow up with a phone call claiming to be "IT Support" to "help fix the problem" — in reality, it's a trick to install Remote Access Tools that lead to data theft or ransomware deployment.

What is a Fake IT Support Attack?

Fake IT Support Attack is a social engineering tactic where hackers "create a problem" for the target first, then "offer to fix it" — a psychological technique that makes victims trust and willingly grant computer access without suspecting they are being attacked.

The 5-Step Attack Process

Step What Hackers Do Objective
Step 1 Spam Bomb — Send thousands of spam emails to the target Create stress so the victim wants help
Step 2 Phone call introducing themselves as the organization's IT Support Build credibility using technical jargon to appear professional
Step 3 Request Remote Access via Teams, AnyDesk, or TeamViewer Gain access to the victim's computer
Step 4 Install C2 Framework (Havoc, Cobalt Strike) Plant a backdoor for long-term machine control
Step 5 Steal data or install Ransomware for ransom Access critical data or encrypt all system files

Why is This Attack So Effective?

Reasons Why Fake IT Support Has Such a High Success Rate:

  • Employees are stressed from being flooded with spam and will accept help from anyone
  • Hackers sound just like real IT staff — using technical terms and knowing the organization's system names
  • They use normal channels (Microsoft Teams, phone calls) that are not blocked by firewalls
  • No malware in the emails — passes all antivirus checks because the emails are just spam with no malicious attachments

Traditional Phishing vs Fake IT Support Comparison

Comparison Traditional Phishing Fake IT Support
Attack Channel Email with links/attachments Phone + Teams + Email
Antivirus Detection? Partially detectable Undetectable
Click Required? Yes No — the victim installs remote access themselves
Complexity Level Low-Medium Very High
Outcome Stolen passwords/data Full machine control + lateral movement across the network

Impact on ERP Systems

If hackers gain Remote Access to a machine running ERP — they can immediately access all data:

  • Financial data — balance sheets, income-expenses, bank account numbers
  • HR data — employee salaries, national ID numbers
  • Customer data — risk of PDPA violations with fines up to 5 million baht

Read more: ERP System Security | Disaster Recovery | Risk Management for Organizations

How to Prevent Fake IT Support Attacks for Organizations

Establish official IT Support channels — use a ticket system only; do not provide support via direct phone calls
Never grant Remote Access to unsolicited callers — always verify identity through another channel
Conduct Security Awareness training for employees — teach them about new Social Engineering tactics
Use Multi-Factor Authentication (MFA) — even with stolen passwords, system access is denied without OTP
Restrict software installation privileges — regular employees should not have admin rights on their machines
Set up Email Filtering to catch spam bombs — use rate limiting to detect large volumes of emails in a short time
Block unauthorized Remote Access Tools — allow only tools approved by the organization

Social Engineering does not attack systems — it attacks people. The best defense is training and having clear processes in place.

— Saeree ERP Development Team

References

If your organization wants to strengthen ERP system security, you can schedule a demo or contact our advisory team for further discussion.

Interested in ERP for your organization?

Consult with our expert team at Grand Linux Solution — free of charge

Request Free Demo

Call 02-347-7730 | sale@grandlinux.com

Saeree ERP Team

About the Author

Paitoon Butri

Network & Server Security Specialist, Grand Linux Solution Co., Ltd.