In today’s world, it’s crucial to protect ourselves from those who seek to exploit us. Tech support scams ranked among the top five scams reported to the FBI and were the most reported type of fraud targeting the elderly in 2023.1
Tech support scams can occur through many channels, including virtual methods like phone calls, pop-up messages, paid ads on search engines, as well as physical interactions in the workplace. Scammers use social engineering tactics to trick victims into divulging personal information or money. It is important to equip yourself with the knowledge needed to recognize and avoid these types of scams.
Here’s an example of a tech support scam:
Linda is doing some research for a project when a pop-up message appears on her screen with an alarming message:
“Computer Scan - Warning! Suspicious activity is detected on your computer. Contact a live technician now. 1-888-685-9322”
The message seems urgent and official. Playing on her sense of panic, Linda calls the number.
“Thank you for calling support. You are speaking with James. How can I help?”
The person who answered sounded professional and concerned. Linda began to explain what the pop-up message said. James replied,
“We are getting a lot of calls about this issue. You don’t want to mess around with that attack. You might lose a lot of financial data. To fix this issue, I need you to download a specific program that will allow me to remotely access your system and remove the virus.”
What Linda didn’t realize was that she had fallen victim to a tech support scam. The pop-up message, urgent phone call, and remote access request were all part of a deceptive social engineering scheme designed to exploit her fears and gain control of her computer.
Another technique used in tech support scams involves a pop-up message that instructs you to download a software update by visiting a website rather than call a number. This site could be malicious and prompt you to install software that falsely claims to remove a virus.
Scams can also occur through cold calls, where the phone number may be spoofed, falsely displayed to appear like it’s from a legitimate tech company. These scammers may offer to resolve the issue for a fee or gift card.
Another tactic attackers use in tech support scams is posing as IT support at the workplace. They may claim to be there to download updated virus protection on your computer. They might also use technical jargon to sound credible and create a sense of urgency. It’s crucial to verify the identity of anyone claiming to provide tech support before allowing them access to your computer or network. Always contact your IT department or security team if you have any doubts.
Tech support scams, like any other cyber-attack, are all too common. Attackers are skilled at exploiting our emotions to make us fall victim. Remember, it is crucial to act quickly to protect yourself and others. By staying informed and cautious, you’ll be better prepared to protect your information and significantly reduce the risk of falling prey to these scams.