How Tech Support Scams Work
Scammers have been peddling bogus security software for years. They set up fake websites, offer free “security” scans, and send alarming messages to try to convince you that your computer is infected. Then, they try to sell you software to fix the problem. At best, the software is worthless or available elsewhere for free. At worst, it could be malware — software designed to give criminals access to your computer and your personal information.The latest version of the scam begins with a phone call. Scammers can get your name and other basic information from public directories. They might even guess what computer software you’re using.
Once they have you on the phone, they often try to gain your trust by pretending to be associated with well-known companies or confusing you with a barrage of technical terms. They may ask you to go to your computer and perform a series of complex tasks. Sometimes, they target legitimate computer files and claim that they are viruses. Their tactics are designed to scare you into believing they can help fix your “problem.”
Once they’ve gained your trust, they may:
ask you to give them remote access to your computer and then make changes to your settings that could leave your computer vulnerable
try to enroll you in a worthless computer maintenance or warranty program
ask for credit card information so they can bill you for phony services — or services you could get elsewhere for free
trick you into installing malware that could steal sensitive data, like user names and passwords
direct you to websites and ask you to enter your credit card number and other personal information
Regardless of the tactics they use, they have one purpose: to make money.
Comments