
A technical support scam, or tech support scam, is a type of
scam
A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their Trust (emotion), trust. Confidence tricks exploit victims using a combination of the victim's credulity, naivety, compassion, vanity, confidence ...
in which a scammer claims to offer a legitimate
technical support
Technical support, commonly shortened as tech support, is a customer service provided to customers to resolve issues, commonly with consumer electronics. This is commonly provided via call centers, online chat and email. Many companies provid ...
service. Victims contact scammers in a variety of ways, often through fake
pop-ups resembling
error messages or via fake "help lines" advertised on
website
A website (also written as a web site) is any web page whose content is identified by a common domain name and is published on at least one web server. Websites are typically dedicated to a particular topic or purpose, such as news, educatio ...
s owned by the scammers. Technical support scammers use
social engineering and a variety of
confidence trick
A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using a combination of the victim's credulity, naivety, compassion, vanity, confidence, irrespons ...
s to persuade their victim of the presence of problems on their
computer
A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
or
mobile device
A mobile device or handheld device is a computer small enough to hold and operate in hand. Mobile devices are typically battery-powered and possess a flat-panel display and one or more built-in input devices, such as a touchscreen or keypad. ...
, such as a
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
infection, when there are no issues with the victim's device. The scammer will then persuade the victim to pay to fix the fictitious "problems" that they claim to have found. Payment is made to the scammer via
gift card
A gift card, also known as a gift certificate in North America, or gift voucher or gift token in the UK, is a prepaid stored-value card, stored-value money card, usually issued by a retailer or bank, to be used as an alternative to cash for pu ...
s or cryptocurrency, which are hard to trace and have few
consumer protection
Consumer protection is the practice of safeguarding buyers of goods and services, and the public, against unfair practices in the marketplace. Consumer protection measures are often established by law. Such laws are intended to prevent business ...
s in place.
Technical support scams have occurred as early as 2008. A 2017 study of technical support scams found that of the IPs that could be geolocated, 85% could be traced to locations in
India
India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
, 7% to locations in the
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
and 3% to locations in
Costa Rica
Costa Rica, officially the Republic of Costa Rica, is a country in Central America. It borders Nicaragua to the north, the Caribbean Sea to the northeast, Panama to the southeast, and the Pacific Ocean to the southwest, as well as Maritime bo ...
. Research into tech support scams suggests that
millennials
Millennials, also known as Generation Y or Gen Y, are the demographic cohort following Generation X and preceding Generation Z. Researchers and popular media use the early 1980s as starting birth years and the mid-1990s to early 2000s a ...
and those in
generation Z
Generation Z (often shortened to Gen Z), also known as zoomers, is the demographic cohort succeeding Millennials and preceding Generation Alpha. Researchers and popular media use the mid-to-late 1990s as starting birth years and the early 2 ...
have the highest exposure to such scams; however, senior citizens are more likely to fall for these scams and lose money to them. Technical support scams were named by
Norton as the top
phishing
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
threat to
consumer
A consumer is a person or a group who intends to order, or use purchased goods, products, or services primarily for personal, social, family, household and similar needs, who is not directly related to entrepreneurial or business activities. ...
s in October 2021;
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
found that 60% of consumers who took part in a survey had been exposed to a technical support scam within the previous twelve months. Responses to technical support scams include
lawsuit
A lawsuit is a proceeding by one or more parties (the plaintiff or claimant) against one or more parties (the defendant) in a civil court of law. The archaic term "suit in law" is found in only a small number of laws still in effect today ...
s brought against companies responsible for running fraudulent call centres and
scam baiting.
Origin and distribution
The first tech support scams were recorded in 2008.
Technical support scams have been seen in a variety of countries, including the
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
,
Canada
Canada is a country in North America. Its Provinces and territories of Canada, ten provinces and three territories extend from the Atlantic Ocean to the Pacific Ocean and northward into the Arctic Ocean, making it the world's List of coun ...
,
United Kingdom
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
,
Ireland
Ireland (, ; ; Ulster Scots dialect, Ulster-Scots: ) is an island in the North Atlantic Ocean, in Northwestern Europe. Geopolitically, the island is divided between the Republic of Ireland (officially Names of the Irish state, named Irelan ...
,
The Netherlands
, Terminology of the Low Countries, informally Holland, is a country in Northwestern Europe, with Caribbean Netherlands, overseas territories in the Caribbean. It is the largest of the four constituent countries of the Kingdom of the Nether ...
,
Germany
Germany, officially the Federal Republic of Germany, is a country in Central Europe. It lies between the Baltic Sea and the North Sea to the north and the Alps to the south. Its sixteen States of Germany, constituent states have a total popu ...
,
Australia
Australia, officially the Commonwealth of Australia, is a country comprising mainland Australia, the mainland of the Australia (continent), Australian continent, the island of Tasmania and list of islands of Australia, numerous smaller isl ...
,
New Zealand
New Zealand () is an island country in the southwestern Pacific Ocean. It consists of two main landmasses—the North Island () and the South Island ()—and List of islands of New Zealand, over 600 smaller islands. It is the List of isla ...
,
India
India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
, and
South Africa
South Africa, officially the Republic of South Africa (RSA), is the Southern Africa, southernmost country in Africa. Its Provinces of South Africa, nine provinces are bounded to the south by of coastline that stretches along the Atlantic O ...
.
A 2017 study of technical support scams published at the
NDSS Symposium found that, of the tech support scams in which the IPs involved could be
geolocated, 85% could be traced to locations in India, 7% to locations in the United States and 3% to locations in Costa Rica. India has millions of
English speakers
English is a West Germanic language that developed in early medieval England and has since become a global lingua franca. The namesake of the language is the Angles, one of the Germanic peoples that migrated to Britain after its Roman o ...
who are competing for relatively few jobs. One municipality had 114 jobs and received 19,000 applicants.
This high level of
unemployment
Unemployment, according to the OECD (Organisation for Economic Co-operation and Development), is the proportion of people above a specified age (usually 15) not being in paid employment or self-employment but currently available for work du ...
serves as an incentive for tech scamming jobs, which are often well-paid.
Additionally, scammers exploit the levels of unemployment by offering jobs to people desperate to be employed.
Many scammers do not realise they are applying and being trained for tech support scam jobs,
but many decide to stay after finding out the nature of their job as they feel it is too late to back out of the job and change careers.
Scammers are forced to choose between keeping their job or becoming jobless.
Some scammers convince themselves that they are targeting wealthy people that have money to spare, which justifies their theft,
whilst others see their job as generating "easy money".
Some scammers rationalize that the victim needs an anti-virus anyway and therefore, it is acceptable to tell the victim lies and charge them for technical support or to charge them for an anti-virus.
Operation
Technical support scams rely on social engineering to persuade victims that their device is infected with malware.
Scammers use a variety of confidence tricks to persuade the victim to install
remote desktop software
In computing, the term remote desktop refers to a software- or operating system feature that allows a personal computer's desktop environment to be run remotely from one system (usually a PC, but the concept applies equally to a server or a sma ...
, with which the scammer can then take control of the victim's computer. With this access, the scammer may then launch various Windows components and utilities (such as the
Event Viewer), install third-party utilities (such as
rogue security software
Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on th ...
) and perform other tasks in an effort to convince the victim that the computer has critical problems that must be remediated, such as infection with a
virus
A virus is a submicroscopic infectious agent that replicates only inside the living Cell (biology), cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are ...
. Scammers target a variety of people, though research by Microsoft suggests that millennials (defined by Microsoft as age 24-37) and people part of generation Z (age 18-23) have the highest exposure to tech support scams and the
Federal Trade Commission
The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) United States antitrust law, antitrust law and the promotion of consumer protection. It ...
has found that seniors (age 60 and over) are more likely to lose money to tech support scams. The scammer will urge the victim to pay so the "issues" can be fixed.
Initiation

Technical support scams can begin in a variety of ways. Some variants of the scam are initiated using pop-up advertising on infected websites or via
cybersquatting
Cybersquatting (also known as domain squatting) is the practice of registering, trafficking in, or using an Internet domain name, with a bad faith intent to profit from the goodwill of a trademark belonging to someone else.
The term is derived ...
of major websites. The victim is shown pop-ups which resemble legitimate error messages such as a
Blue Screen of Death
The blue screen of death (BSoD) or blue screen error, blue screen, fatal error, bugcheck, and officially known as a stop erroris a fatal system error, critical error screen displayed by the Microsoft Windows operating systems to indicate a cr ...
and freeze the victim's
web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
. The pop-up instructs the victim to call the scammers via a phone number to "fix the error". Technical support scams can also be initiated via
cold calls. These are usually
robocalls which claim to be associated with a legitimate third party such as
Apple Inc.
Apple Inc. is an American multinational corporation and technology company headquartered in Cupertino, California, in Silicon Valley. It is best known for its consumer electronics, software, and services. Founded in 1976 as Apple Comput ...
Technical support scams can also attract victims by purchasing
keyword advertising on major search engines for phrases such as "Microsoft support". Victims who click on these adverts are taken to
web page
A web page (or webpage) is a World Wide Web, Web document that is accessed in a web browser. A website typically consists of many web pages hyperlink, linked together under a common domain name. The term "web page" is therefore a metaphor of pap ...
s containing the scammer's phone numbers. In some cases, mass emailing is used. The email tends to state that a certain product has been purchased using their Amazon account and contact a certain telephone number if this is an error.
Confidence tricks
Once a victim has contacted a scammer, the scammer will usually instruct them to download and install a
remote access program such as
TeamViewer,
AnyDesk,
LogMeIn
GoTo Technologies USA, Inc., formerly LogMeIn Inc., is a software as a service (Software as a service, SaaS) company that provides unified communication and IT management software. The company was founded in 2003, and is based in Boston, Mass ...
or
GoToAssist.
The scammer convinces the victim to provide them with the credentials required to initiate a remote-control session, giving the scammer complete control of the victim's desktop.
The scammer will not tell the victim that he is using a remote control software and that the purpose is to gain access to the victim’s PC. The scammer will say "this is for connecting you to our secure server" or "I am going to give you a secure code" which in reality is just an ID number used by the remote desktop software package.
After gaining access, the scammer attempts to convince the victim that the computer is suffering from problems that must be repaired. They will use several methods to misrepresent the content and significance of common Windows tools and system directories as evidence of malicious activity, such as viruses and other malware.
These tricks are meant to target victims who may be unfamiliar with the actual uses of these tools, such as inexperienced users and senior citizens.
The scammer then coaxes the victim into paying for the scammer's services and/or software, which they claim is designed to "repair" or "clean" the computer but is either malicious or simply does nothing at all.
* The scammer may open Windows' Event Viewer, which displays a
logfile
In computing, logging is the act of keeping a log of events that occur in a computer system, such as problems, errors or broad information on current operations. These events may occur in the operating system or in other software. A message or ...
of various events for use by
system administrator
An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as Server (computing), servers. The ...
s to troubleshoot problems. Although many of the log entries are relatively harmless notifications, the scammer may claim that the log entries labeled as warnings and errors are evidence of "system corruption" that must be "fixed" for a fee.
[
* The scammer may show system folders that contain unusually named files to the victim, such as those in Windows' Prefetch and ]Temp
Temp or Temps may refer to:
* Temperature
** Weather, by association
* Temporary file, in computing
** Temporary folder
** Temporary variable
* Temp track, or temp score or temp music, audio used during editing of TV and film production
* Te ...
folders, and claim that the files are evidence of malware on the victim's computer. The scammer may also open some of these files in Notepad
A notebook (also known as a notepad, writing pad, drawing pad, or legal pad) is a book or stack of paper pages that are often Ruled paper, ruled and used for purposes such as note-taking, Diary, journaling or other writing, drawing, or scrapbooki ...
, wherein binary file contents are rendered as mojibake
Mojibake (; , 'character transformation') is the garbled or gibberish text that is the result of text being decoded using an unintended character encoding. The result is a systematic replacement of symbols with completely unrelated ones, often ...
. The scammer claims that malware has corrupted these files, causing the unintelligible output. In reality, the files in Prefetch are typically harmless, intact binary files used to speed up certain operations.
* The scammer may falsely claim that normally disabled Windows services should not be disabled and that these services were disabled due to a computer virus.
* The scammer may misuse Command Prompt
A command-line interface (CLI) is a means of interacting with software via commands each formatted as a line of text. Command-line interfaces emerged in the mid-1960s, on computer terminals, as an interactive and more user-friendly alternativ ...
tools to generate suspicious-looking output, for instance using the tree
or dir /s
command which displays an extensive listing of files and directories. The scammer may claim that they are "searching for malware and hackers", and while the tool is running the scammer will enter text purporting to be an error message (such as "ECHO security breach ... trojans found") that will appear when the job finishes, or will open a text file with such claims in Notepad or Word.
* The scammer may misrepresent innocuous values and keys that are stored in the Windows Registry
The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry. The kernel, device drivers, services, Security Accounts Manager, a ...
as being signs of malware.[
* The " Send To" Windows function is associated with a ]globally unique identifier
A Universally Unique Identifier (UUID) is a 128-bit label used to uniquely identify objects in computer systems. The term Globally Unique Identifier (GUID) is also used, mostly in Microsoft systems.
When generated according to the standard methods ...
. The output of the command assoc
, which lists all file associations on the system, displays this association with the line ZFSendToTarget=CLSID\
; this GUID is the same on all recent versions of Windows. The scammer may claim that this is a unique ID used to identify the user's computer, before reading out the identifier to "verify" that they are a legitimate support company with information on the victim's computer, or claim that the CLSID listed is actually a "Computer Licence Security ID" that must be renewed.
* The scammer may claim that the alleged "problems" are the result of expired hardware or software warranties
In law, a warranty is an expressed or implied promise or assurance of some kind. The term's meaning varies across legal subjects. In property law, it refers to a covenant by the grantor of a deed. In insurance law, it refers to a promise by the ...
and then coax the victim into paying for a nonsensical and fraudulent "renewal service".
* The scammer may block the victim from viewing their screen, claiming that it is the result of malware or of a scan being run, and use this time to search the victim's files for sensitive information, attempt to break into the victim's bank account with stolen or found credentials or activate the webcam and see the victim's face.
* The scammer may run the command line tool known as netstat
, which shows local and foreign IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es. The scammer then tells the victim that these addresses belong to foreign hacker
A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
s that have gained access to their network.
* The scammer may claim that legitimate Windows process such as rundll32.exe
are viruses. Often, the scammer will search Google or Yahoo for an article about RUNDLL32.EXE and will scroll to a section saying that the process name can also possibly be part of a malware infection, even though the victim's computer does not contain malware.
Payment and impact
The preferred method of payment in a technical support scam is via gift card
A gift card, also known as a gift certificate in North America, or gift voucher or gift token in the UK, is a prepaid stored-value card, stored-value money card, usually issued by a retailer or bank, to be used as an alternative to cash for pu ...
s. Gift cards are favoured by scammers because they are readily available to buy and have less consumer protection
Consumer protection is the practice of safeguarding buyers of goods and services, and the public, against unfair practices in the marketplace. Consumer protection measures are often established by law. Such laws are intended to prevent business ...
s in place that could allow the victim to reclaim their money back. Additionally, the usage of gift cards as payment allows the scammers to extract money quickly whilst remaining anonymous. Tech support scammers have also been known to ask for payment in the form of cryptocurrency
A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.
Individual coin ownership record ...
, cheque
A cheque (or check in American English) is a document that orders a bank, building society, or credit union, to pay a specific amount of money from a person's account to the person in whose name the cheque has been issued. The person writing ...
s and direct bank transfers made through automated clearing house (the latter only gives victims 60 days to recover their funds).
If a victim refuses to follow the scammer's instructions or to pay them, scammers have been known to resort to insulting and threatening their victim to procure payment. Scammers may also resort to bullying
Bullying is the use of force, coercion, Suffering, hurtful teasing, comments, or threats, in order to abuse, aggression, aggressively wikt:domination, dominate, or intimidate one or more others. The behavior is often repeated and habitual. On ...
, coercion
Coercion involves compelling a party to act in an involuntary manner through the use of threats, including threats to use force against that party. It involves a set of forceful actions which violate the free will of an individual in order to i ...
, threat
A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation f ...
s and other forms of intimidation
Intimidation is a behaviour and legal wrong which usually involves deterring or coercing an individual by threat of violence. It is in various jurisdictions a crime and a civil wrong (tort). Intimidation is similar to menacing, coercion, terro ...
and psychological abuse
Psychological abuse, often known as emotional abuse or mental abuse, is a form of abuse characterized by a person subjecting or exposing another person to a behavior that may result in psychological trauma, including Anxiety disorder, anxiety, c ...
towards their target in an effort to undermine the victim's ability to think clearly, making them more likely to be forced further into the scam. Crimes threatened to be inflicted on victims or their families by scammers have ranged from theft
Theft (, cognate to ) is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word ''theft'' is also used as a synonym or informal shor ...
, fraud
In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrato ...
and extortion
Extortion is the practice of obtaining benefit (e.g., money or goods) through coercion. In most jurisdictions it is likely to constitute a criminal offence. Robbery is the simplest and most common form of extortion, although making unfounded ...
, to serious crimes such as rape
Rape is a type of sexual assault involving sexual intercourse, or other forms of sexual penetration, carried out against a person without consent. The act may be carried out by physical force, coercion, abuse of authority, or against a person ...
and murder
Murder is the unlawful killing of another human without justification (jurisprudence), justification or valid excuse (legal), excuse committed with the necessary Intention (criminal law), intention as defined by the law in a specific jurisd ...
. Canadian
Canadians () are people identified with the country of Canada. This connection may be residential, legal, historical or cultural. For most Canadians, many (or all) of these connections exist and are collectively the source of their being ''C ...
citizen Jakob Dulisse reported to CBC CBC may refer to:
Media
* Cadena Baja California or Grupo Cadena, a radio and television broadcaster in Mexico
* Canadian Broadcasting Corporation, Canada's radio and television public broadcaster
** CBC Television
** CBC Radio One
** CBC Music
** ...
in 2019 that, upon asking a scammer who made contact with him as to why he had been targeted, the scammer responded with a death threat; 'Anglo people who travel to the country' (India
India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
) were ' cut up in little pieces and thrown in the river.' Scammers have also been known to lock uncooperative victims out of their computer using the syskey
utility (present only in Windows versions previous to Windows 10
Windows 10 is a major release of Microsoft's Windows NT operating system. The successor to Windows 8.1, it was Software release cycle#Release to manufacturing (RTM), released to manufacturing on July 15, 2015, and later to retail on July 2 ...
) or third party applications which they install on the victim's computer, and to delete documents and/or programs essential to the operation of the victim's computer if they do not receive payment. On Windows 10 and 11, since Microsoft removed the syskey utility, scammers will change the user’s account password. The scammer will open the Control Panel, go into user settings and click on change password, and the scammer will ask the user to type in his password in the old password field. The scammer will then create a password that only he knows and will reboot the computer. The user won’t be able to log into his PC unless he pays the scammer.
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
commissioned a survey by YouGov
YouGov plc is a international Internet-based market research and data analytics firm headquartered in the UK with operations in Europe, North America, the Middle East, and Asia-Pacific.
History
2000–2010
Stephan Shakespeare and Nadhim ...
across 16 countries in July 2021 to research tech support scams and their impact on consumers. The survey found that approximately 60% of consumers who participated had been exposed to a technical support scam within the last 12 months. Victims reported losing an average of 200 USD
The United States dollar (symbol: $; currency code: USD) is the official currency of the United States and several other countries. The Coinage Act of 1792 introduced the U.S. dollar at par with the Spanish silver dollar, divided it int ...
to the scammers and many faced repeated interactions from other scammers once they had been successfully scammed. Norton named technical support scams as the top phishing threat to consumers in October 2021, having blocked over 12.3 million tech support scam URL
A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identi ...
s between July and September 2021.
Response
Legal action has been taken against some companies carrying out technical support scams. In December 2014, Microsoft filed a lawsuit against a California
California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
-based company operating such scams for "misusing Microsoft's name and trademarks" and "creating security issues for victims by gaining access to their computers and installing malicious software, including a password grabber that could provide access to personal and financial information". In December 2015, the state of Washington
Washington, officially the State of Washington, is a state in the Pacific Northwest region of the United States. It is often referred to as Washington State to distinguish it from the national capital, both named after George Washington ...
sued the firm iYogi for scamming consumers and making false claims in order to scare the users into buying iYogi's diagnostic software. iYogi was also accused of falsely claiming that they were affiliated with Microsoft, Hewlett-Packard
The Hewlett-Packard Company, commonly shortened to Hewlett-Packard ( ) or HP, was an American multinational information technology company. It was founded by Bill Hewlett and David Packard in 1939 in a one-car garage in Palo Alto, California ...
and Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
.
In September 2011, Microsoft dropped gold partner Comantra from its Microsoft Partner Network following accusations of involvement in cold-call technical-support scams. However, the ease with which companies that carry out technical support scams can be launched makes it difficult to prevent tech support scams from taking place.
Major search engines such as Bing
Bing most often refers to:
* Bing Crosby (1903–1977), American singer
* Microsoft Bing, a web search engine
Bing may also refer to:
Food and drink
* Bing (bread), a Chinese flatbread
* Bing (soft drink), a UK brand
* Bing cherry, a varie ...
and Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
have taken steps to restrict the promotion of fake technical support websites through keyword advertising. Microsoft-owned advertising network
An online advertising network or ad network is a company that connects advertisers to websites that want to host advertisements. The key function of an ad network is an aggregation of ad supply from publishers and matching it with the advertiser' ...
Bing Ads (which services ad sales on Bing and Yahoo! Search
Yahoo! Search is a search engine owned and operated by Yahoo!, using Microsoft Bing to power results.
Originally, "Yahoo! Search" referred to a Yahoo!-provided interface that sent Web search query, queries to a searchable index of pages supple ...
engines) amended its terms of service in May 2016 to prohibit the advertising of third-party technical support services or ads claiming to "provide a service that can only be provided by the actual owner of the products or service advertised". Google announced a verification program in 2018 in an attempt to restrict advertising for third-party tech support to legitimate companies.
Scam baiting
Tech support scammers are regularly targeted by scam baiting, with individuals seeking to raise awareness of these scams by uploading recordings on platforms like YouTube
YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
, cause scammers inconvenience by wasting their time and protect potential victims. A good example of this is the YouTube community Scammer Payback.
Advanced scam baiters may infiltrate the scammer's computer, and potentially disable it by deploying remote access trojans, distributed denial of service attacks and destructive malware. Scam baiters may also attempt to lure scammers into exposing their unethical practices by leaving dummy files or malware disguised as confidential information such as credit/debit card information and passwords on a virtual machine
In computing, a virtual machine (VM) is the virtualization or emulator, emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve ...
, which the scammer may attempt to steal, only to become infected. Sensitive information important to carrying out further investigations by a law enforcement agency
A law enforcement agency (LEA) is any government agency responsible for law enforcement within a specific jurisdiction through the employment and deployment of law enforcement officers and their resources. The most common type of law enforcement ...
may be retrieved, and additional information on the rogue firm may then be posted or compiled online to warn potential victims.
In March 2020, an anonymous YouTuber under the alias Jim Browning successfully infiltrated and gathered drone and CCTV
Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
footage of a fraudulent call centre scam operation through the help of fellow YouTube personality Karl Rock. Through the aid of the British documentary programme ''Panorama
A panorama (formed from Greek language, Greek πᾶν "all" + ὅραμα "view") is any Obtuse angle, wide-angle view or representation of a physical space, whether in painting, drawing, photography (panoramic photography), film, seismic image ...
'', a police raid was carried out when the documentary was brought to the attention of assistant police commissioner Karan Goel, leading to the arrest of call centre operator Amit Chauhan who also operated a fraudulent travel agency under the name "Faremart Travels".
See also
* Advance-fee scam
An advance-fee scam is a form of fraud and is a common confidence trick. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster claims will be us ...
* Antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
* Cybercrime in India
* IRS impersonation scam
* SSA impersonation scam
An SSA impersonation scam, or SSA scam, is a class of telecommunications scam targeting citizens of the United States by impersonating Social Security Administration employees. SSA scams are typically initiated through pre-recorded messages, or ...
* Telemarketing fraud
* Virus hoax
* List of scams
References
Further reading
*
*
External links
Official Microsoft support page on technical support scams
Official Symantec support page on technical support scams
by a security research group
Dial One for Scam: A Large-Scale Analysis of Technical Support Scams
{{Scams and confidence tricks
Confidence tricks
Cybercrime
Fraud in India
Remote desktop
Telephone crimes