{"id":33329,"date":"2024-06-03T18:31:37","date_gmt":"2024-06-03T16:31:37","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/fake-tech-support-scam\/33329\/"},"modified":"2024-06-03T18:31:37","modified_gmt":"2024-06-03T16:31:37","slug":"fake-tech-support-scam","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/fake-tech-support-scam\/33329\/","title":{"rendered":"&#8220;Hi, this is tech support&#8221;"},"content":{"rendered":"<p>According to the <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2023_IC3Report.pdf\" target=\"_blank\" rel=\"nofollow noopener\">FBI\u2019s 2023 Internet Crime Report<\/a>, more than 37,500 complaints about fake tech-support scams were reported in the U.S. last year alone \u2014 resulting in over $924 million in losses. In this post, we discuss how these scams work, the dangers they pose, and <a href=\"https:\/\/www.kaspersky.co.za\/premium?icid=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">how to protect yourself<\/a> from this type of fraud.<\/p>\n<h2>How fake tech-support scams work<\/h2>\n<p>In this scheme, scammers typically impersonate technical or customer-support staff of major companies \u2014 most often in the tech industry. This allows the cybercriminals to use impressive-sounding terms and technical details that are incomprehensible to the average user.<\/p>\n<p>The most common pretext under which fake tech-support scammers initiate contact with potential victims is by claiming to have detected some problem on the latter\u2019s computer. For example, fake employees of a software developer or well-known antivirus company call you with a made-up story about their having detected malware on your computer.<\/p>\n<p>Scammers thus overwhelm their victims, instilling panic and a sense of helplessness. The scammers then manipulate these emotions to build trust \u2014 these schemes are usually designed to ensure the victim has no choice but to trust the scammer. It\u2019s this trust that the scammers ultimately exploit to achieve their goals.<\/p>\n<h2>How fake tech-support scammers find you<\/h2>\n<p>To make initial contact with the potential victim, tech-support scammers use a variety of tricks. But in general there are three basic scenarios.<\/p>\n<h3>Fake websites and social media accounts<\/h3>\n<p>Some scammers create web pages or social media accounts that mimic those of legitimate companies. They may also use search engine or social media ads to promote these fake resources, hoping that potential victims will come to them looking for help with technical issues.<\/p>\n<p>To carry out the attack, the scammers need to be in continuous contact with the victim. For this reason, they usually come up with some pretext to switch communication to phone calls or messaging apps.<\/p>\n<h3>Pop-up windows and \u201cproblem detected\u201d notifications<\/h3>\n<p>Another popular scenario for this scam involves using pop-up windows and notifications that mimic operating system or antivirus warnings. These notifications, usually alarmingly red or orange in color, warn that something is wrong with the victim\u2019s computer \u2014 most often that there\u2019s a virus.<\/p>\n<p>Again, since the scammers need to actively communicate with the victim, they usually provide a phone number to call in order to resolve the detected problem.<\/p>\n<h3>Phone calls<\/h3>\n<p>Finally, the most popular method of contacting victims is direct phone calls. These can be roughly divided into \u201ccold\u201d and \u201cwarm\u201d calls. In the former case, fake tech-support scammers simply dial random numbers, often posing as representatives of major companies whose products are widely used. For example, you don\u2019t have to try very hard to find a Windows user.<\/p>\n<p>Warm calls involve using information obtained through breaches or leaks of customer data from certain companies. Naturally, knowing the victim\u2019s name and the products they use gives the scammers more credibility, increasing their chances of success.<\/p>\n<h2>What is the main danger of fake tech-support scams?<\/h2>\n<p>Looking closer at the figures we started this post with, you\u2019ll notice that tech-support scams aren\u2019t about small charges for non-existent services. The average reported loss is almost $25,000.<\/p>\n<p>This highlights the main danger of fake tech-support: scammers don\u2019t settle for small profits, but instead try to extract as much from their victims as possible. To do this they devise intricate schemes and utilize <a href=\"https:\/\/www.kaspersky.com\/blog\/social-engineering-tricks\/48539\/\" target=\"_blank\" rel=\"noopener nofollow\">social engineering<\/a> techniques.<\/p>\n<p>In particular, tech-support scammers often pressure victims into installing remote-access or screen-sharing software, disclosing or exposing passwords for financial accounts, and sharing one-time transaction confirmation codes. They might even stage elaborate performances involving multiple phone calls from various \u201ccompany employees\u201d, \u201cfinancial institutions\u201d, or \u201cgovernment agencies\u201d.<\/p>\n<h2>How to protect yourself from fake tech-support scammers<\/h2>\n<p>If someone contacts you claiming to be from tech support, warns you of some danger, and asserts that action must be taken <em>immediately<\/em> \u2014 most likely it\u2019s a fake tech-support scammer.<\/p>\n<p>Try not to panic, and avoid doing anything you might regret later. It\u2019s better to discuss what\u2019s happening with someone else, as this can help you identify inconsistencies and holes in the scammer\u2019s story. To buy time, ask them to call you back \u2014 say that you\u2019re busy, you have another call, your phone has low battery, or simply pretend to get cut off.<\/p>\n<p>In addition, to protect against scammers, you can take the following measures:<\/p>\n<ul>\n<li>Install <a href=\"https:\/\/www.kaspersky.co.za\/premium?icid=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">a reliable security solution<\/a> on all your devices and trust its warnings.<\/li>\n<li>Never enter your login credentials while someone else is watching, for example while you\u2019re screen sharing or if someone has remote access to your computer.<\/li>\n<li>Avoid installing remote access software on your computer, and certainly never grant access to strangers. By the way, our protection can <a href=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/\" target=\"_blank\" rel=\"noopener nofollow\">warn you about such dangers<\/a>.<\/li>\n<\/ul>\n<p>It\u2019s also worth remembering that the people particularly vulnerable to tech-support scams are the <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2023_IC3ElderFraudReport.pdf\" target=\"_blank\" rel=\"nofollow noopener\">elderly<\/a>. They may not be particularly cyber-savvy, so they need <a href=\"https:\/\/www.kaspersky.co.za\/premium?icid=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> more than anyone.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-family\">\n","protected":false},"excerpt":{"rendered":"<p>Fake tech-support has long been a trend in fraud worldwide. We explain how it works, and what you can do to protect yourself.<\/p>\n","protected":false},"author":2706,"featured_media":33330,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2670],"tags":[3720,80,1695,726,567,422],"class_list":{"0":"post-33329","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-fake-support","9":"tag-fraud","10":"tag-remote-access","11":"tag-scam","12":"tag-technical-support-2","13":"tag-threats"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fake-tech-support-scam\/33329\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/fake-tech-support-scam\/27519\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/fake-tech-support-scam\/22838\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/fake-tech-support-scam\/11706\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/fake-tech-support-scam\/30191\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/fake-tech-support-scam\/27671\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/fake-tech-support-scam\/27425\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/fake-tech-support-scam\/30087\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/fake-tech-support-scam\/28981\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/fake-tech-support-scam\/37585\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/fake-tech-support-scam\/12433\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fake-tech-support-scam\/51386\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/fake-tech-support-scam\/21932\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/fake-tech-support-scam\/22668\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/fake-tech-support-scam\/31330\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/fake-tech-support-scam\/36486\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/fake-tech-support-scam\/27835\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fake-tech-support-scam\/33664\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/33329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=33329"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/33329\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/33330"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=33329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=33329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=33329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}