Phishing & Social Engineering
What is a Tech Support Scam?
A technical support scam is a fraud scheme where perpetrators impersonate employees of trusted technology companies—Microsoft, Apple, Google, Adobe, and others—and claim the victim's device has a security problem, malware infection, or software issue requiring immediate attention.
A technical support scam is a fraud scheme where perpetrators impersonate employees of trusted technology companies—Microsoft, Apple, Google, Adobe, and others—and claim the victim's device has a security problem, malware infection, or software issue requiring immediate attention. Scammers initiate contact through pop-up advertisements, phishing emails, SMS messages, or unsolicited phone calls, then request payment, device access, or financial account credentials to "resolve" the fabricated problem. These scams exploit user trust in established technology brands and anxiety around device security.
How does a tech support scam operate?
Tech support scams employ multiple initiation methods, each designed to create a sense of urgency and perceived legitimacy.
Pop-up Advertisement Attacks
Malicious pop-ups appear on victim's browsers while browsing legitimate websites. The pop-up claims the device is infected with malware, compromised, or has software vulnerabilities. Fake error messages mimic operating system warnings—Windows Defender alerts, macOS security warnings—using official company branding and logos. The pop-up provides a phone number or link to "Microsoft support" or "Apple support."
Pop-ups are designed to appear legitimate because they use authentic branding and familiar warning language. Users conditioned to trust security warnings are psychologically vulnerable to these attacks.
Phishing Email and SMS Delivery
Victims receive emails claiming to be from Microsoft, Apple, or another tech company stating that accounts have been compromised or require urgent verification. Messages contain links to fake support portals or phone numbers to call. SMS text messages direct victims to call support with urgency language. These messages exploit email legitimacy and the trust users place in SMS communications.
Unsolicited Phone Calls
Scammers call victims claiming to be from "Microsoft Technical Support" or similar entities. Callers often have access to victim's personal information (name, phone number), creating false credibility. They claim to have detected suspicious activity on the victim's computer or unusual logins. The call creates immediate panic and urgency.
Exploitation Phase
Once victim engagement occurs—either on phone, through website, or after clicking a pop-up—scammers follow a consistent exploitation process.
Scammers claim the device is infected with ransomware, keylogger, or spyware. They reference fabricated security vulnerabilities or software updates. They provide false evidence through fake event logs and error messages. They escalate urgency with language like "Your data is at risk" and "Your bank accounts are being accessed."
Remote Access Acquisition
Scammers request remote access to the victim's computer using TeamViewer, AnyDesk, or similar tools. Victims are guided to download and install remote desktop software. Once the victim grants access, scammers gain full device control and may lock victims out as leverage.
Credential Extraction (High-Value Phase)
With remote access obtained, scammers search for banking credentials, cryptocurrency wallets, and passwords. They take screenshots of password managers or browser autofill data. They access email accounts to enable account recovery options. They capture two-factor authentication codes when possible.
This phase often yields the highest-value compromise—direct access to financial accounts and cryptocurrency wallets.
Financial Exploitation
Scammers may request payment for "fixing" the non-existent problem using credit cards, bank transfers, gift cards, or cryptocurrency. They claim fees of $100-$1,000+ for "software repairs" or "security certification" and create fake invoices or payment confirmations.
Alternatively, scammers use stolen credentials to access victim's financial accounts, transfer funds to attacker-controlled accounts, change passwords to lock victims out, and enable unauthorized transactions. Or they direct victims to move money out of bank accounts into "safe" cryptocurrency wallets (controlled by the scammer), claiming banks are "unsafe" and require emergency fund transfer.
How does tech support scam differ from other fraud?
Factor | Tech Support Scam | Phishing Email | Ransomware Attack |
|---|---|---|---|
Initial Contact | Pop-up, phone call, email | Email link | Malware attachment or exploit |
Urgency Level | Very high (device locked, data at risk) | Moderate (verify account) | High (encrypted data with timer) |
Attacker Interaction | Direct (phone/remote access) | Passive (link clicking) | Passive (malware installs and encrypts) |
Credential Capture | Direct observation via remote access | Credential harvesting page | Not typically (focuses on encryption) |
Financial Extraction | Direct payment OR account takeover | Credential reuse for fraud | Ransom payment |
Data Exfiltration | Common (via remote access) | Depends on phishing goal | Common (before encryption) |
Average Loss per Victim | $500-$15,000+ | $100-$5,000 | $10,000-$1,000,000+ |
Victim Demographics | Older adults (60+), less tech-savvy | General population | Organizations, high-value targets |
The critical distinction is direct victim interaction. Tech support scams require real-time communication (phone or remote session), limiting scalability but increasing psychological pressure on victims.
Why does tech support scam matter?
Tech support scams generate enormous financial impact. According to FBI IC3 2024 Annual Report, tech support scams generated losses of $1.464 billion in 2024, up $500 million from 2023. This represents an 87% increase from 2022 levels ($800 million estimated).
Victim Volume and Impact
Over 36,000 victims reported tech support scams to the FBI in 2024, with estimated actual victimization 2-3x higher due to underreporting. Average loss per victim is approximately $1,700 (derived from total losses divided by complaint volume), but reported cases range from $500 to over $90,000.
Seniors suffer disproportionately. Seniors (60+) filed 147,127 complaints in 2024—a 46% increase from 2023. Losses for seniors reached $4.885 billion across all fraud types, with tech support being a significant portion. One senior reported losing $90,000 in a single tech support scam incident, according to AARP (2024).
Year-Over-Year Growth
2024 losses increased 58% over 2023 levels ($1.464B vs. ~$926M estimated). Growth is accelerating as scammers scale operations and refine tactics. Emergence of AI-enhanced scam calls with realistic voice synthesis is accelerating this trend in 2025.
Law Enforcement Response - 2024
215+ arrests were made through joint FBI-India CBI operations targeting tech support scam networks, representing a 700% increase in arrests from the previous year. 60+ actionable leads were shared between agencies. Multiple fraud compounds were disrupted in India, Philippines, and Southeast Asia, indicating successful international law enforcement coordination.
What are the limitations of tech support scams?
Attacker Constraints
Unlike phishing, tech support scams require real-time communication, limiting scalability and increasing exposure risk to law enforcement. Remote access tools like TeamViewer and AnyDesk leave digital forensic trails; victims can often disconnect and retain evidence. Public awareness campaigns from FBI, AARP, and FTC have significantly increased recognition of classic tech support scam tactics.
Modern operating systems include SmartScreen and Gatekeeper filters blocking remote access tools, warnings when programs request elevated privileges, device lock detection preventing scammers from fully locking victims out, and Windows Defender/macOS Security detection of suspicious remote sessions.
Financial System Defenses
Financial institutions now detect large gift card purchases followed by resale, wire transfers to high-risk jurisdictions, cryptocurrency purchase patterns matching scam profiles, and rapid cash withdrawals in senior account patterns.
Call Detection and Blocking
Phone carriers now offer caller ID spoofing detection, spam call filtering (CallBlock, Nomorobo, etc.), integration with law enforcement detection databases, and real-time warning systems for known scam numbers.
Remote Access Tool Restrictions
TeamViewer and AnyDesk now flag suspicious access patterns, implement approval workflows for unattended access, collect forensic data on scam sessions, and cooperate with law enforcement.
How can individuals and organizations defend against tech support scams?
Individual-Level Protections
Legitimate tech companies do NOT call unsolicited about device problems. Pop-up warnings are NOT from operating systems—close the browser window without clicking the number or link. Never grant remote access to unsolicited callers, even if they have personal information. If you must grant access, stay at your computer during the entire session and disconnect immediately if anything seems wrong.
Official support should be accessed by visiting the company website directly, not clicking pop-up links. Treat any unsolicited tech support contact as suspicious, regardless of caller authority.
Never move funds based on phone support requests, even from seemingly official sources. Verify urgent financial requests through independent channels by calling your bank directly. Financial institutions do NOT ask you to move funds via cryptocurrency. Enable multi-factor authentication on all financial accounts. Use separate cards/accounts for high-risk activities.
Perform regular software updates from official sources only. Use legitimate antivirus/antimalware software (Windows Defender, Malwarebytes, etc.). Enable automatic Windows/macOS security updates. Use strong, unique passwords with password manager. Enable firewall on all devices. Disable file sharing and remote access features you don't actively use.
Never provide passwords to anyone claiming to be tech support. Legitimate support never requires passwords. Check for phishing in email addresses (officialsupport@microsoft.c0m vs. microsoft.com). Verify domain in email addresses (legitimate Microsoft emails end in @microsoft.com).
Organizational-Level Protections
Conduct regular security awareness training on tech support scam tactics. Teach employees never to grant remote access without independent verification. Establish clear protocol: contact IT support using known internal numbers, never respond to unsolicited calls. Emphasize that legitimate IT never asks for passwords.
Implement zero-trust network architecture. Require multi-factor authentication on all sensitive systems. Implement principle of least privilege for user account permissions. Use privileged access management (PAM) requiring approval for elevated access. Disable remote desktop services if not required for business.
Deploy EDR (Endpoint Detection and Response) tools to detect unauthorized remote access tools. Monitor for suspicious processes and network connections. Alert on installation of TeamViewer, AnyDesk, or similar tools. Implement behavioral analytics to detect unusual access patterns.
Monitor employee accounts for unusual financial transactions. Require multi-approval for large fund transfers. Educate employees on why legitimate vendors don't demand gift cards or cryptocurrency.
Technology Company Defenses
Microsoft SmartScreen blocks known scam pop-ups and sites. Apple Gatekeeper and System Integrity Protection prevent unauthorized remote access. Browser extensions warn about known scam URLs. Official support channels educate users on scam tactics. Integration with law enforcement helps identify fraudsters.
Financial Institution Defenses
Velocity checks monitor wire transfers and fund movements. Cryptocurrency purchase monitoring detects scam patterns. Gift card purchase monitoring flags large, rapid purchases. Warnings on large cash withdrawals in senior accounts. Account lockdown capability for suspected compromised accounts.
FAQs
How can I tell if a pop-up warning is real or a scam?
Pop-up warnings claiming your device is infected are almost always scams. Legitimate operating systems do NOT show pop-ups asking you to call a support number. Real security warnings are found in Settings or Security center, not pop-ups. If you see a pop-up claiming "Microsoft" or "Apple" wants you to call, close the browser window immediately without clicking the number or link. Then verify by visiting the company's official website and checking your account, according to FTC (2025) and AARP (2024).
Should I ever give remote access to my computer to someone claiming to be tech support?
Only if YOU initiated contact with the company and called their official number verified through their website. Never grant remote access to unsolicited callers, even if they have personal information about you. Legitimate tech support can verify your issue without full device access or will provide a specific ticket number to verify independently. If you must grant access, stay at your computer during the entire session and disconnect immediately if anything seems wrong, according to FBI (2024) and Synovus (2025).
What should I do if I've already given a scammer remote access to my computer?
(1) Disconnect the computer from the internet immediately; (2) Force-shutdown if necessary to stop ongoing access; (3) Contact your bank and financial institutions to freeze accounts; (4) Change passwords from a different device after reporting to your bank; (5) Run antivirus/antimalware scans after reconnecting; (6) Consider full system backup and reinstall if sensitive data was accessed; (7) Enable fraud alerts with credit bureaus; (8) File reports with FBI IC3, FTC, and local law enforcement; (9) Monitor credit reports for identity theft, according to FBI (2024) and FTC (2025).
How much money do victims typically lose in tech support scams?
Average losses are approximately $1,700 per incident, but reported cases range from $500 to over $90,000. A documented case involved a senior citizen losing $90,000 after being convinced to move funds to a "safe" cryptocurrency wallet. Total 2024 losses reached $1.464 billion across 36,000+ reported victims. Actual victim count may be 2-3x higher, according to FBI IC3 (2024) and AARP (2024).
What are warning signs if someone calls claiming to be tech support?
Major red flags: (1) Unsolicited call claiming to be from Microsoft, Apple, or your provider; (2) References to pop-ups you've never seen; (3) Claims your device is infected or data is at risk; (4) Requests for remote access or asking you to download software; (5) Requests for payment (especially gift cards or cryptocurrency); (6) Asking you to move funds out of your bank; (7) Speaking with strong accent but claiming to be from major US company. Hang up immediately and call the company directly using a number from their official website, according to FBI (2024), FTC (2025), and AARP (2024).



