Criminals will pretend to work for the tech support department of large and reputable companies. They will convince the victim something’s wrong with their PC or some software on it and this needs to be resolved immediately. The cybercriminals offer a solution, but this does require them to connect to the victim’s PC. Once connected, they can obtain sensitive information. They might urge the victim to log in to their online banking portal to pay for the assistance provided. When the victim gives in, they will register their login details through keylogging and can easily steal their money.

Want to know how to recognize and prevent tech support scams? Read the article down below to find out more.

What Is Help Desk Fraud?

Essentially, tech support scams are a type of phishing. They rely on deception to get victims to give the perpetrator access to their computer, or to hand over personal information and even passwords. As such, the criminals will obtain access to the victim’s online banking portal, or even be able to pose as the victim online. The latter means they could order expensive products in your name, or even worse, request huge loans.

How Do Tech Support Scams Work?

Which questions and actions on behalf of “tech support agents” should make you feel wary? To be able to recognize help desk scams, it’s crucial to know how these criminals operate. That’s why we’ll walk you through a common method tech support scammers use. We’ll focus on a common Microsoft scam, where the scammer claims to work for Microsoft technical support.

Initial contact

The very first step consists of the perpetrator getting in touch with their victim. This usually happens in one of the following three ways:

The scammer simply calls the victim, without notifying them prior to the call (cold calling). When the victim is looking for support himself he is redirected to a malicious, fake tech support site (often due to a typo) and calls the phone number on this website. The victim’s computer is infected with malware. As a result, a pop-up appears and claims there is an issue that needs to be resolved immediately by calling the phone number in the pop-up.

When the scammer is finally talking to the victim, he will introduce himself as a tech support employee or help desk member, or another role that is supposed to invoke trust in the victim. Also, they generally use an American or Western-sounding name, such as “John Smith”. The tech support fraudster will come across as very serious and concerned and explain the victim’s computer is experiencing a serious problem. He might come up with a crafty story about a fake virus, for instance. In order to “resolve the problem”, the scammer claims he needs access to the victim’s device.

Access to your PC

In order to “help you”, the criminal will prompt the victim to install otherwise legitimate remote PC control software, such as Teamviewer or Anydesk. This type of software is also used by IT departments of big companies in order to resolve a problem an employee is experiencing remotely. The scammer will walk the victim through the process of granting them remote access. Of course, they will be dishonest about the associated risks of what they’re doing and what they’re actually doing.

“Solving the problem”

Now the scammer has access to the victim’s computer. The victim will likely see his mouse moving all over the screen, seemingly by itself. They might get a little nervous, and rightfully so. “John Smith” will assure the victim he’s only doing what’s necessary to resolve the issue. However, in reality, he is likely turning off any security features your device has and changing important settings. They might even install actual malware on your computer. That way they will have access to your PC, even when the screen-sharing has ended. In some cases, they also hide the screen so you can’t see exactly what they are doing on your computer. Generally, the criminals work together in pairs of two. One of them will take over the victim’s PC, while the other one keeps them distracted on the phone, so the victim is not paying enough attention to what’s happening. Now, the perpetrators have accomplished their goal: complete control over the victim’s device and the ability to access all of his data, including what he is typing on his keyboard (keylogging). Now it’s all about getting access to the victim’s bank account. Using a crafty story, the perpetrator might ask the victim what bank they use and prompt them to log in to their online banking portal to pay for the help they received. If the victim gives in, the criminals will easily obtain the victim’s login credentials, thanks to keylogging. Now the tech support scammers can easily access the victim’s bank account and transfer funds as they please. Many of these scammers also prey on the elderly or those who don’t know how to use computers properly. They primarily look for the less tech-savvy crowd to run their scams effectively.

Social engineering

In essence, tech support scams are simply a form of social engineering. The example above, for instance, relies on a combination of distraction and deception, to get the victim to actually cooperate in creating his own demise. Another important aspect of this social engineering is that the perpetrators usually pretend to work for a large and trustworthy company or organization. This will create trust and make it easier to deceive victims. If the criminals are shrewd enough, there will always be a few (likely more vulnerable individuals, such as senior citizens) people they manage to trick. That’s all the tech support fraudsters need to make a considerable amount of money.

Common Tech Support Scams

As stated above, it’s important to recognize tech support scams, which is why below we’ll list three common scams.

Generally, these scams have the same end goal: getting access to the victim’s device and obtaining as much cash as possible from them (usually by obtaining their banking login credentials).

How To Recognize and Prevent Tech Support Scams

Tech support fraud can be very deceptive and hard to deal with. Fortunately, there are often still some warning signs and tips you can follow to prevent becoming a victim. As such, we’ll list a few tips below to help you recognize and prevent help desk fraud.

Lots of tech support scammers are from third-world countries with large urban centers, such as India. As such, perpetrators might have quite a thick, easily recognizable accent. On top of that, they often use Western names that don’t necessarily match their accented voice. It’s very unlikely large and trustworthy companies will call their customers unannounced in case of a problem. Generally, they will reach customers through more official channels, such as by post. Alternatively, since many organizations such as banks have their own online portals, they might reach you that way. If there is a very pressing matter, such as suspected bank fraud, they might send a text message, but generally with the instruction to call the office phone number of your bank (which you can check online). Banks will never ask you for your login credentials or PIN code. Even if you lose or forget your credentials, there will be a secure process to reset your login information. You will not just be asked to give your sensitive information to someone on the phone. If someone asks you to do this, this is likely just a phishing scam to get access to your online banking portal! If something seems fishy about a call or message from a so-called tech support employee, trust your instincts. Hang up the phone and contact the organization that the caller (or messenger) claims to be a part of directly, through their official channels. You can generally find these on their official website. Remember that these types of scams don’t just happen by phone. Remember that tech support fraudsters can just as easily send you a scam email or a text message. Or, they might even send you a letter by post. Whatever form of communication, they’ll most likely prompt you to call some phone number. Needless to say, your call will be answered by a help desk scammer. In this case, follow the same advice as above: if you don’t trust it, always contact the company using their official phone number or other channels, to verify the email or letter actually comes from them.

What Should I Do if Tech Support Scammers Keep Calling Me?

If help desk fraudsters have obtained your phone number somehow and keep calling you, this can be extremely frustrating and even stressful. That’s why we’ll give you some tips and what to do in this situation.

Don’t pick up the phone if you’re called by a number you don’t know. Especially if you notice it’s a foreign number. (If a foreign number is calling you, not only could it be a scam, but you might also incur costs for receiving a call from abroad). If in doubt whether to call back after a missed call, do a quick Google search to see if the number pops up on pages discussing spam and (help desk) scams. Look for the official helpline number of the service the person claims to be calling from. Hang up as soon as you feel you’re dealing with a scam. Block the scammers’ phone numbers on your phone. Contact your phone provider about any unwanted calls.

How Do Scammers Obtain My Phone Number?

There are two main ways in which help desk fraudsters obtain phone numbers to call. Firstly, they often buy large databases of phone numbers and personal details which have been obtained during data leaks or hacks. It’s easy to obtain these long lists of leaked info on the dark web, for instance. Another way to contact potential victims is to simply use a type of software that automatically generates random phone numbers. This technique is often used by many “professional” scam call centers (more on this later). Needless, to say, this technique doesn’t create as much trust with the victim as the first one. After all, obtaining databases with not just phone numbers, but also names and other personal details, allows the criminals to address their victims in a more personalized way.

What To Do If You’re a Help Desk Fraud Victim?

Help desk fraudsters operate in a very shrewd way. Therefore, theoretically, anyone can become their next victim. If you’re a victim of tech support scammers, follow these steps:

The Scale of the Problem: Tech Support Scam Call Centres

You might ask yourself why, if help desk fraud has been a serious problem for years, we haven’t eradicated it yet. Unfortunately, it’s not that easy. In certain regions of the world, there are actual call centers that specialize in this form of cybercrime. They have large numbers of people working for them and are quite numerous themselves. Many of these call centers are located in countries with large urban centers, incredibly competitive job markets, and low wages. A common example is India. In other words, it’s not just a question of catching “a few cyber criminals”. To make the problem go away, large systemic changes are likely needed. But until then, we hope the tips in this article will help you stay safe from tech support fraud. Check out this article to learn about customer support fraud and other types of NFT scams.

Conclusion

Remember, large companies don’t just go around calling their customers and asking them for sensitive information. After all, they have secure processes in place to prevent fraud. So if someone calls you asking you to do this, this should always be a red flag. Companies also face other types of fraud, such as CEO fraud, which is becoming increasingly prevalent. When in doubt, always hang up and contact the company directly and ask them what’s going on. Furthermore, be sure to observe the other tips in this article to stay safe.

What Is Help Desk Fraud and How to Identify Such Scams - 89What Is Help Desk Fraud and How to Identify Such Scams - 59What Is Help Desk Fraud and How to Identify Such Scams - 78What Is Help Desk Fraud and How to Identify Such Scams - 8What Is Help Desk Fraud and How to Identify Such Scams - 27What Is Help Desk Fraud and How to Identify Such Scams - 34What Is Help Desk Fraud and How to Identify Such Scams - 14What Is Help Desk Fraud and How to Identify Such Scams - 18