ScamLens
High Risk Average Loss: $1,000 Typical Duration: 1-3 hours

Tech Support Scams: Identifying and Protecting Yourself

Tech support scams involve fraudsters impersonating legitimate tech companies like Microsoft, Apple, or antivirus providers to convince victims their devices are compromised. These scams often begin with alarming pop-up messages appearing on a user's screen, claiming a virus or critical error has been detected and providing a fake helpline number. Alternatively, scammers may cold-call individuals, pretending to be from a well-known tech company and asserting they've detected suspicious activity on the victim's network or computer. Once contact is established, scammers use scare tactics and technical jargon to pressure victims into believing their computer is in grave danger. They often demand remote access to the device, ostensibly to 'fix' the problem, but instead, they might install malware, steal personal data, or simply pretend to perform repairs. The ultimate goal is to extract payment for unnecessary or non-existent services, typically demanding hundreds to thousands of dollars via unconventional methods like gift cards, wire transfers, or cryptocurrency. According to the Federal Trade Commission (FTC), consumers reported losing nearly $650 million to tech support scams in 2023, with a median individual loss of $1,000. Older adults (60+) are disproportionately affected, reporting higher median losses, though younger demographics are also targeted through more sophisticated online tactics. This scam is particularly dangerous because it exploits trust in established brands and preys on fear of digital threats. Beyond financial loss, victims risk having their personal information stolen, their devices compromised with malicious software, or even their accounts locked. The typical duration of an active scam interaction can range from one to three hours, during which scammers maintain high pressure to prevent victims from thinking clearly or seeking a second opinion.

Common Tactics

  • Scammers display alarming pop-up messages on your screen, often mimicking official system alerts, claiming your computer is infected or has a critical error and providing a fake support number.
  • They cold-call individuals, falsely identifying themselves as representatives from major tech companies like Microsoft, Apple, or your internet service provider, stating they've detected a problem with your device or network.
  • Fraudsters use high-pressure sales tactics and technical jargon to create a sense of urgency and fear, convincing victims that immediate action is required to prevent data loss or system failure.
  • They demand remote access to your computer, often guiding you to download specific software, which allows them to manipulate your screen, install malware, or access your personal files.
  • Scammers insist on immediate payment for their 'services,' often demanding unusual methods like gift cards, wire transfers, cryptocurrency, or peer-to-peer payment apps, claiming these are the only acceptable forms.
  • They may 'demonstrate' fake problems on your computer by opening system logs or command prompts, pointing to normal system processes as evidence of severe issues to justify their fraudulent charges.

How to Identify

  • You receive an unsolicited call, email, or pop-up message claiming to be from a tech company about a problem you didn't report.
  • The message or caller uses urgent, alarming language, threatening immediate data loss, system crashes, or legal action if you don't comply.
  • The 'tech support' agent asks for remote access to your computer, especially if they contacted you first.
  • They demand payment for services using unconventional methods like gift cards, cryptocurrency, or wire transfers, rather than standard credit card processing.
  • The caller or message claims to be from a well-known company but provides generic contact information or a phone number that doesn't match official company websites.
  • They refuse to provide their employee ID, a verifiable case number, or a direct callback number for their department, or they become aggressive when questioned.

How to Protect Yourself

  • Never respond to unsolicited calls, emails, or pop-up messages claiming to be from tech support; legitimate companies will not contact you this way about an unrequested issue.
  • Do not grant remote access to your computer to anyone who contacts you unexpectedly, regardless of how convincing they sound.
  • If you suspect a problem with your computer, contact the tech company directly using official phone numbers or websites found independently, not those provided in suspicious messages.
  • Be highly suspicious of anyone demanding payment via gift cards, wire transfers, or cryptocurrency; legitimate tech support services use secure, traceable payment methods.
  • Keep your operating system, web browser, and antivirus software updated to protect against known vulnerabilities and detect malicious software.
  • Report any suspected tech support scams to the FTC at ReportFraud.ftc.gov and your local law enforcement agency to help authorities track and stop these criminals.

Real-World Examples

An elderly user receives a full-screen pop-up on their computer stating 'Windows Defender Alert! Your computer is infected with spyware. Call 1-888-XXX-XXXX immediately.' Panicked, they call the number, grant remote access, and are charged $500 for a 'lifetime antivirus subscription' paid via gift cards.

A scammer cold-calls a homeowner, claiming to be from 'Microsoft Support' and stating their network shows signs of a severe virus. The scammer convinces the victim to download 'diagnostic software,' which is actually remote access software, and then charges them $800 to 'clean' a non-existent infection.

A user clicks on a malicious link in a phishing email, which leads to a fake website displaying a 'critical error' message and a phone number for 'Apple Support.' Upon calling, the scammer gains remote access to their Mac, pretends to fix issues, and demands $1,200 in Bitcoin for 'advanced security services.'

Frequently Asked Questions

What should I do if I already gave a scammer remote access to my computer?
Immediately disconnect your computer from the internet by unplugging the Ethernet cable or turning off Wi-Fi. Then, change all your passwords for online accounts, especially banking and email, from a different, secure device. Run a full scan with reputable antivirus software to detect and remove any malware.
What if I already paid a tech support scammer?
Contact your bank or credit card company immediately to report the fraudulent charge and attempt to reverse the transaction. If you paid with gift cards, contact the card issuer (e.g., Apple, Google, Amazon) to see if the funds can be frozen. Report the incident to the FTC and local law enforcement.
How can I tell if a tech support call or message is legitimate?
Legitimate tech companies will not cold-call you about a problem with your computer. If you receive an unsolicited call or pop-up, do not engage. Instead, independently find the official contact information for the company (e.g., Microsoft, Apple) and contact them directly to inquire about any issues.
Can scammers really lock my computer or steal my data?
Yes, scammers can install malware that locks your computer or encrypts your files, demanding a ransom. If they gain remote access, they can also browse your files, steal personal information, or install keyloggers to capture your passwords, making data theft a significant risk.
What if they installed software on my computer?
Assume any software installed by a scammer is malicious. Disconnect from the internet, then use a trusted antivirus program to scan and remove any suspicious applications. If you are unsure, consider seeking help from a reputable, local computer repair professional to thoroughly clean your system.

Think you encountered this scam?