Tech Support Scams Overview
"Tech Support Scams" are a very prevalent form of online fraud where scammers pose as technical support representatives from reputable companies like Microsoft, Apple, or popular antivirus software providers.
The scammer's goal is to gain remote access to a victim's computer, steal their personal information, install malware, or extort money.
How Tech Support Scams Operate
Due to the prevalence of these types of scams, the exact method is usually different from one case to another. However, they all follow a similar approach:
Scammer Initiates Contact
Unsolicited Contact: Scammers often initiate contact through phone calls, pop-up ads, or emails claiming to detect critical issues with their victim's computer.
Urgency and Fear: Scammers create a sense of urgency by claiming their victim's computer is infected with malware, being hacked, or facing imminent data loss.
Scammer Establishes Trust
Impersonation: Scammers use convincing tactics to mimic legitimate tech support representatives, including names and scripts that sound authentic.
Technical Jargon: Scammers may employ technical terms to confuse and intimidate victims, making it seem like they have expertise.
Scammer Gains Remote Access
Persuasion: Scammers will pressure their victims to allow remote access to their computer, claiming it's necessary to diagnose and fix the supposed issue.
Installation of Software: Scammers will often ask their victims to download and install remote access software, giving them control over their system.
Scam Victim Exploitation
Fake Diagnosis: Once the scammer has access, they will fabricate problems and offer to fix them for a fee.
Data Theft: Scammers may steal sensitive information like passwords, credit card numbers, and personal data.
Malware Installation: If the scammers are provided remote access to their victim's computer, they can install malware to further compromise the system and potentially steal more information.
Financial Extortion: Scammers may demand payment for fake services, threaten to lock out their victims from their computer, or release sensitive information if the victim doesn't comply.
What to Do if You're Targeted
Ignore Unsolicited Contact: Legitimate tech support companies won't randomly call, email, or text you about problems with your computer. Despite the size of these companies, they do not have the resources required to proactively reach out to individual customers about potential computer issues - no matter the severity.
Delete The Email: If you receive an email that claims your computer has a virus, or is being hacked, delete the email without clicking on any links or opening any attachments.
Block The Number: If you receive an unsolicited phone call from a tech support agent, hang-up immediately and block the number.
Be Suspicious of Urgency: Remember, scammers often create a sense of panic to pressure their victim's into making hasty decisions.
Preventing Tech Support Scams
Due to the evolving nature of tech support scams, there is no singular method for preventing them altogether. The best course of action you can take is to familiarize yourself with the information above and stay vigilant.
Trust your instincts, if something "feels off" about a person and you're becoming increasingly suspicious, it's probably a good indication you're talking to a scammer.