Customer Service Survey Scam Removal Instructions

Customer Service Survey Scam Removal Instructions

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article has been created in order to explain to you what is the Customer Service Survey Scam scam and how you can remove the scamming message and the potentially unwanted program that is causing it on your PC.

The Customer Service Survey Scam is a newly discovered email phishing campaign that attempts to manipulate that targets into revealing sensitive information about themselves. At the mooment we do not have information about the perpetrators behind it. Our article gives an in-depth explanation of how it propagates and how victims can attempt to remove active infections.

Threat Summary

NameCustomer Service Survey Scam
TypePhishing email scam
Short DescriptionThe Customer Service Survey Scam is a recent example of the scam tactic that extorts the targets into revealing personal information.
SymptomsVictims will receive email messages that contain the phishing instructions.
Distribution MethodPhishing emails.
Detection Tool See If Your System Has Been Affected by Customer Service Survey Scam


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Customer Service Survey Scam.

Customer Service Survey Scam – Overview

The Customer Service Survey Scam is a newly discovered phishing strategy which appears to target computer users worldwide. So far the spread seems to be limited in number, possibly indicating that this is a test release. If this is the case then we anticipate that the messages can be changed — new text can be added and personalized further.

At the moment the exact source of targets is not known, there are several possibilities:

  • Location-Based — The users might be selected from certain locations such as countries, cities or areas.
  • Interests-Based — The victims can be selected according to their specific interests. This is more difficult however in this the number of successful infiltrations.
  • Based on Hijacked & Bought Data Sets — When the malicious operators are targeting users via ready-made sets the attacks usually make use of the available information. Additional data collection may be done only to add to the already known sets of data about the target users.

It is very likely that the perpetrators behind it are going to use various domains, names, signatures and etc. There are two main types of phishing scam messages — generic and personalized. The first one is related to the construction of generic messages that are sent to all users in a bulk action. The personalized messages make use of the all information that is available about the victims — their name, address, phone number and any other information that can identify them.

An example message is the following:

Welcome to recruitment shoppers.

We have a customer service survey assignment in your location,
and we would like you to participate and complete the assignment.
Once you register, you will receive instructions about the job, and access to training materials from us.

Should you interested, we will pay you $450/ assignment, (available two assignment/weeks),

Provide the following information below to continue sign-up, and you will have access to training materials from us.


Thank you for your participation and being here with us.

The MS applications team.

The message extracted from this Customer Service Survey Scam campaigns shows that the main goal of the hackers is to coerce the targets into revealing sensitive data about themselves. The listed values are the following: name, address, state/city/zip code, phone number, age and gender.

The emails also include file attachments that may lead to any of the following malware infections:

  • Trojans — These viruses establish a secure connection to a hacker-controlled server. It is used to spy on the users, take over control of their machines and steal their files. In addition this can trigger other processes such as information gathering. Such modules can extract information that can directly reveal the identity of the users and harvest data that can create a complete profile of the machines owned by the hackers.
  • Cryptocurrency Miners — They represent malicious scripts that take advantage of the available system resources in order to carry out complex calculations. Whenever the results of the successful operations are reported the operators will receive digital currency such as Bitcoin and Monero.
  • Ransomware — One of the most popular payloads are the ransomware viruses which aim to encrypt target user data according to a built-in list of file extensions. Usually this includes user data such as: archives, backups, databases, images, videos and music. Using a ransomware note, desktop wallpaper, lockscreen or another visual notification the victims will be blackmailed to pay the decryption fee.

Upon receiving such messages they should be flagged as SPAM. To protect from any spyware infections we suggest that all users use a quality anti-malware solution.

Remove Customer Service Survey Scam Scam from Windows and Your Browser

If you want to remove the Customer Service Survey Scam scam from your computer, we strongly suggest that you follow the removal instructions posted underneath this article. They have been created with the main idea In mind to help you delete this virus either manually or automatically. Be advised that according to experts the best way to try and remove the software that is causing the Customer Service Survey Scam scamming pop-ups is to use an advanced anti-malware software. Such program is created with the idea in mind to fully scan your computer and try to eliminate any traces of unwanted programs while protecting your computer against future infections as well.


Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share