Tech Support Scam: Signs, Prevention Tips and Reporting Authorities

Tech Support Scams

Tech Support Scam: Signs, Prevention Tips and Reporting Authorities

Tech Support Scams

What are tech support scams?

Technical support scams are common worldwide, and scammers often use similar approaches to deceive innocent people. Typically, they impersonate companies like Apple, Microsoft, Google etc, and contact individuals about a computer virus, technical issue, or security concern. Their goal is to instill fear and urgency, prompting victims to seek their assistance or pay for fake services. The scammers offer to "fix" the issue and trick individuals into revealing personal information or use other tactics to steal their money. Globally, fake technical support scams have been reported in many countries including, Canada, United States, Ireland, United Kingdom, The Netherlands, Germany, Australia, New Zealand, India, and South Africa, among others. 

How to identify fake technical support calls?

Unsolicited contact:

The scammers pretend to call or email from companies like Microsoft, Apple etc “trying” to fix a non-existent issue. Sometimes, they even send pop-up messages that seem to come from a legitimate source — all to extract sensitive information from uninformed individuals.

Last year in the US, a retired accountant from Brooklyn, New York lost $100,000 in a tech support scam. Scammers called her after her laptop froze and told her they owed her a refund of $10 for the premium she paid for antivirus, which failed because of them. The scammer faked a mistaken deposit and pressured her to return the money. The woman could not figure out that it was her own funds transferred between accounts. She was asked to return the money in cash, and a code word was given to her. She withdrew the cash and handed it to a courier using the secret code word. It was much later that she realized it was all an elaborate scam.

Fear and urgency:

Most online scams rely on fear and urgency to steal money or sensitive information from victims. This tactic is also commonly used in phone scams by fake IT support. Scammers call people about a virus or tell them their system has been hacked, causing individuals to act out of fear without thinking rationally.

Asking for remote access:

Do not install any remote access software on your device upon scammers’ insistence. Common remote access programs include AnyDesk and TeamViewer. Cybercriminals pressure you to install these, saying they will "fix" your computer, but their real intent is to steal your information.

Uncommon payment demands:

To stay off the police radar, scammers often request payment through gift cards, cryptocurrencies, or wire transfers. Stay alert and be cautious if you receive such a request.

Refund scams, overpayments, and cash transactions:

If a tech support representative calls you about a lucrative refund, verify its legitimacy through reliable channels. Similarly, if you receive a call about an accidental transfer of funds with a request for repayment, consider it a red flag. Also, keep in mind that legitimate tech support will never demand payments through gift cards or wire transfers. 

Warning messages:

Be cautious of warning messages on your devices that say your device has a virus, has been hacked, or has a security concern. These messages are designed to create fear and pressure you into taking immediate action.

What to do if you are a victim of a tech support scam?

If you have fallen victim to a technical support scam, take these actions as soon as you can to minimize damage:

  1. Contact your bank: Immediately contact your bank and inform them about all the transactions you have made. Keep screenshots and receipts ready, if any. Keep monitoring your account and report any questionable activity. 
  2. Stop all communications with the scammer: As soon as you realize you have been scammed, stop communicating with the scammer. They might try to lure you into giving more money by pretending to help you.
  3. Disconnect internet: If you have provided remote access to your device, it is important that you disconnect the internet to avoid any further loss. 
  4. Check for suspicious software on your device: Uninstall any app you do not recognize and run a security scan using a trusted antivirus software.
  5. Change your passwords: Change passwords for all important accounts, including banking and social media.
  6. Gather evidence: Keep records of phone calls, emails, and text messages to provide to the relevant authorities for investigation and potential blocking of the money transfer.
  7. Report the number on the Truecaller app: Since Truecaller is a community-based platform, reporting helps warn and protect others from scammers.

Country wise reporting authorities for Deepfake Scams

If you are in the United States, these could be some agencies you could reach out to:

Reporting the scam on Truecaller will help prevent others from becoming victims.

Conclusion

Scammers impersonate reputable tech companies to gain trust and then use fear or urgency to deceive individuals into paying money or granting remote access to their devices to fix an issue that does not exist. They often contact people about a virus infecting their device or their system being hacked. It is crucial to stay vigilant and not fall for their fabricated scenarios. Also, installing apps like Truecaller is a reliable way to block spam calls and filter fraudulent messages through their SMS fraud detection feature.

Think you are smarter than scammers?
Take our scam quiz and see how you will fare against frauds.
two screens - one for android and one for iOS, showing truecaller identifying an incoming phone call
DOWNLOAD TODAY

Trust your communicatio­n with Truecaller.

Trusted by over 450 million people, Truecaller is proud to be a leader in caller ID and spam blocking software as well as research around call and SMS harassment.