Angie Kennard felt that something was off with her 79-year-old father. When they talked on the phone he would tell her about a woman he met online and occasionally sent money to. Even though her father never met the woman in person, she professed her love for him through emails and asked him to send her money to feed her and her daughter. Angie told her father that he was being conned, but he would not listen and continued to send the woman money.Read More
A man and a woman walk up to an ATM located in the back of a small drug store. The machine is tucked away in a seating area for people waiting on prescriptions to be filled. They are dressed as ATM technicians and even have a company logo over the shirt pockets of their uniforms. The man carries a small toolbox, while the woman holds a clipboard.Read More
I vividly remember how I felt on my first date. I was 15 years old (now that I have kids, I don’t know what my parents were thinking letting me go), and my body was still catching up to my forehead. My long-time crush of about two weeks drove to pick me up in a black Pontiac Grand Am that had a white Oakley sticker on the back window. He was one year older and was one of the few boys at my school who had a car…that worked.Read More
In today’s world, it’s not uncommon to see headlines about a new instance of fraud many times a week. Whether it’s a new phishing scam targeting seniors or the arrest of a low-level employee embezzling small amounts from a local government office, most fraud-related issues are interesting to the public regardless of their profession. Since anti-fraud professionals are on the front line of fraud prevention and investigation, it’s also predictable that family and friends may turn to you for clarification of these fraud-related stories.Read More
Ron Cresswell, J.D., CFE
ACFE Research Specialist
While reading a blog on your laptop, a pop-up message suddenly obscures your computer screen. The message, which appears to be from Microsoft, says that your computer is infected with a virus and instructs you to call a toll-free number immediately. You call the number and speak to a woman who falsely identifies herself as “Sarah with Microsoft Tech Support.” Sarah wants you to download a program that will give her remote access to your computer so that she can diagnose the problem. If you comply, Sarah will claim to find a dangerous virus, or another serious security issue, which she will offer to fix for a fee.
This is called a tech support scam, and, according to the FBI, these scams are on the rise.
Tech Support Scams
In tech support scams, fraudsters impersonate major high-tech companies (usually Microsoft, Apple, Dell or Google) and convince victims to grant remote access to their computers. In most cases, victims are instructed to download and run common remote access software, such as TeamViewer, GoToMyPC or LogMeIn.
The goal of most tech support scams is to convince the victim to pay for unnecessary computer services to repair nonexistent viruses or other problems. However, in other variations on the scam, the fraudsters:
- Steal the victim’s usernames, passwords and other personal information
- Install spyware or malware on the victim’s computer
- Refuse to relinquish control of the computer until the victim pays a ransom
- Try to sell the victim software that is useless or free
- Try to enroll the victim in a worthless computer maintenance or warranty program
- Direct the victim to a website that asks for credit card numbers and other personal information
- Harass the victim with phone calls seeking additional fees
To prevent being victimized by tech support scams, consumers and businesses should take the following precautions:
- Do not give unknown, unverified persons remote access to computers or install software at their direction.
- Resist the urge to act quickly. In tech support scams, fraudsters create a sense of urgency and fear to compel the victim to act immediately.
- Disregard pop-up messages that instruct the user to call a telephone number for tech support. Legitimate companies do not communicate with customers this way.
- Hang up on unexpected, urgent calls from outsiders who claim to be tech support, even if the caller ID says Microsoft, Dell, Apple or Google. Those companies do not make unsolicited tech support calls.
- If there is a question about whether a communication is legitimate, look up the company’s telephone number and call to verify. Do not use the number on the questionable communication (e.g., pop-up message, caller ID).
- Ensure that computer networks are protected by strong and regularly updated antivirus software and a firewall.
While tech support scams are common, they are usually easy to spot. Generally, they involve an unknown person asking for remote access to your computer. Once identified, such scams can be defeated by following the guidelines listed above.