Tech Support Scams!

Don’t Fall for Tech Support Scams!

Technical support scams are promoted on rogue websites. The deceptive content warns visitors of various fake threats present on their computers. Common themes include: trojan/virus/malware infections, detected hacker activity, computer blocked for security reasons, pirated software/OS found, etc.

These fraudulent messages are disguised as alerts from legitimate entities like Microsoft/Windows, McAfee, Norton, etc. Often the warning message will appear in the bottom right corner of your computer desktop. Sometimes the message will occupy your entire screen and block mouse and keyboard inputs. If this happens, press, and hold the power button until your computer shuts down. Wait 10 seconds and power your computer back on. The warning will no longer be present.

These scams urge users to call toll-free phone numbers to resolve nonexistent issues. Afterward, the scammers instruct victims on how to download/install remote access software. Once the ID/password of such a program is given to the cybercriminals, they connect to the victim's device. How the scam progresses from that point varies depending on the scam.

Typically, the scammers continue with the charade of being support/technicians and perform hoax system scans, bogus malware removal, etc. In most cases, these fake services and/or yearly/lifetime "support subscriptions" cost exorbitant amounts of money. In other cases, the criminals will not ask you for any money. However, there is a feature in most remote support software that allows for custom passwords to be set, which do not change after the session ends. This means your computer can be accessed repeatedly without requiring your permission and without your knowledge. The scammers will now attempt to steal sensitive information such as social security numbers, bank account information, etc.

If you have fallen victim to a technical support scam and allowed cyber criminals to access your system remotely: first, you must disconnect your device from the Internet. Secondly, uninstall the remote access software the scammers used (e.g., UltraViewer, TeamViewer, AnyDesk, etc.) since they will not need your permission to reconnect. Lastly, use anti-virus to run a full system scan and eliminate all detected threats.

If you know of someone who would find this information helpful, please feel free to share this post.

TricycleFish

 

Previous
Previous

PayPal Phishing Scam

Next
Next

10 Tips for Secure Remote Work