You're sitting at your laptop or streaming shows on your tablet when suddenly an alarm blares, and your screen is filled with pop-up alerts indicating a problem. Often, these alerts come from scammers trying to access your money, personal information, or data.
According to the AARP, tech support scams were among the top five scams reported to the FBI last year. There were 37,560 complaints and losses of nearly $1 billion. While scams can be targeted to different age groups, anyone can become a victim of a scam.
At best, the scammers are trying to get you to pay a fee for providing technical support to fix a device or software problem that doesn't exist. At worst, they're trying to steal your personal information. Victims have lost their life savings and dealt with long-term financial and emotional turmoil as a result of tech support scams.
Criminals impersonating online helpers and offering to fix computer viruses isn't a new phenomenon. Tech support scams began about 15 years ago and have evolved since. By impersonating trusted companies, scammers convince victims that their computer or phone has been compromised and offer to help. Sometimes, scammers steal a few hundred dollars for fictitious antivirus software and move on. But if they realize the victim has a large savings, scammers will methodically extract everything they can.
Tech support scammers often use various methods to deceive people, such as pop-ups, text messages, emails, or robocalls. It's important to know that legitimate software and antivirus companies typically do not contact you via phone, email, or text to notify you of an issue with your computer or device. Additionally, security pop-up warnings from reputable companies will never ask you to call a phone number or click on a link.
Companies may contact you through in-app notifications to provide updates, vulnerabilities, or warnings within the software program itself. For example, if you have antivirus software on your device, that program may display alerts directly in its application window. Other notifications may come through automatically via email notifications. If you do receive notifications from a software program, you should confirm that it is legitimate before clicking on any links. Visit the software organization’s official website to find an authorized contact method.
Remote Access. Scammers often ask for remote access to your computer under the guise of "fixing" an issue. In reality, they are installing malware, ransomware, or other unwanted programs aimed at stealing your information or damaging your data and device. This malware can provide them with access to your computer and sensitive data, such as usernames and passwords.
Request of Payment. Beware of requests to make a payment. Scammers often ask you to pay by wire transfer, gift card, prepaid card, cryptocurrency, or money transfer app because they know those types of payments can be hard to trace and reverse.
Isolation. While amid their scheming, the cybercriminal may ask you not to tell anyone else about the situation. Scammers often play into your fear and say that your financial institution is a part of the problem. We've heard of instances where the scammer will stay on the phone with the victim while the victim is at their local bank and will spew falsehoods. They want you to feel isolated, so you won't learn the truth about the ongoing scam.
Emergency. Scammers urge targets to act quickly, claiming the situation is emergent. That sense of urgency prevents you from having time to think clearly and question their behavior. Once they create this false sense of urgency, the cybercriminal will give you instructions. In many scenarios, a victim was told that their Social Security Number, bank account information, and other private details had already been leaked, so they needed to start moving their bank accounts over to a "secure" account. These accounts are set up to steal your money. It's important to take a step back and call your financial institution before you start sending or moving funds.
While scammers are incredibly difficult to identify because many are working out of call centers worldwide, it is still important that you contact local authorities and file a report. The information you provide can help authorities track patterns and may assist with other investigations.
Once a tech support impersonator gets inside your computer, getting them out is tough. It's crucial that you understand the signs of a scam, so you never get to the point of sending money or sharing your personal information.