Fake, Tech Support: The Only Thing They’re Fixing Is Your Bank Account
Fake Tech Support: The Only Thing They’re Fixing Is Your Bank Account
How a “Helpful” Call Turned Costly
Aisha was working from home when a browser pop-up suddenly appeared on her laptop:
“Your Windows operating system is no longer supported and appears to be infected! Your personal information, banking details, and other sensitive data are most likely compromised. For your security, please contact Windows Technical Support immediately.”
Worried she might lose her finances and files, Aisha called the number shown on the screen. After a brief hold, a professional-sounding “technician” answered and assured her they could fix the problem remotely.
They guided her to download “security software” that allowed them to scan her system. As dozens of fake “viruses” appeared on her screen, the technician explained that her computer was heavily infected—but for a one-time fee of $375, they could clean and secure it. Relieved, Aisha paid with her credit card.
Later that week, her credit card company alerted her to multiple unauthorized charges. That’s when Aisha realized the friendly “tech support” team were actually scammers—and now they had access to both her credit card and her computer.
What Are Tech Support Scams?
Tech support scams occur when criminals convince people that something is wrong with their computer, phone, or online account—and that they need immediate help from “technical support.” Scammers often impersonate legitimate companies such as Microsoft, Apple, or even your bank.
These scams may begin with fake browser alerts, operating system pop-ups, phone calls, or text messages claiming your device is infected or your account has been compromised. Regardless of how they start, the goal is always the same: create panic and pressure you to act immediately.
What Are They After?
Tech support scammers are usually after one or more of the following:
- Your money. Victims are charged for fixing problems that don’t exist. Payment is often demanded through gift cards, wire transfers, or cryptocurrency.
- Your personal information. Scammers may ask for names, addresses, passwords, or banking details under the guise of verifying your identity.
- Access to your device or accounts. By convincing you to install remote access software, scammers can spy on activity, steal files, or install real malware.
How These Scams Work
Tech support scams rely heavily on social engineering—manipulating emotions like fear and urgency. A typical scam follows this pattern:
- The fear hook. A pop-up, call, or message claims your system or account is compromised using alarming language.
- The trust play. The scammer poses as a professional from a well-known company, sometimes using official-looking logos or spoofed phone numbers.
- The control and payment. You’re asked to install software or click a link, giving them access to your device, followed by a demand for payment.
How to Protect Yourself
- Stay calm and think. Legitimate companies do not display pop-ups with phone numbers or call you unexpectedly.
- Never call numbers from pop-ups. Close the browser instead of engaging with the message.
- Do not grant remote access. Never allow unknown individuals access to your devices or accounts.
- Secure your accounts. If you suspect a scam, change your passwords immediately and monitor your financial activity.
Final Thoughts
Tech support scams prey on fear, urgency, and trust—and they can happen to anyone. Legitimate companies will never ask for remote access or payment to fix an issue. Staying calm and skeptical is your best defense.
Guest Editor
Jennifer Cox is a Solutions Consulting Director at Tines, an intelligent automation company transforming cybersecurity operations. A multi-award-winning cybersecurity leader, she is passionate about mentoring future professionals and advancing innovation, excellence, and inclusion across the global cybersecurity ecosystem. linkedin.com/in/jennifermcox
Resources
OUCH! is published by SANS Security Awareness and distributed under the Creative Commons BY-NC-ND 4.0 license . You are free to share or distribute this newsletter as long as you do not sell or modify it.
You can find more OUCH! newsletters at sans.org/newsletters/ouch.