Fake Tech Support Scams: How They Trick You and What to Do About It

Table Of Content
- ⚠️ Fake Tech Support Scams: How They Trick You and What to Do About It
- 🧠 What Is a Tech Support Scam?
- 🔍 What It Looks Like in Real Life
- 🎣 How They Hook You
- 💳 What Do They Really Want?
- 🧯 What to Do If You Encounter a Tech Support Scam
- 🧠 How to Recognize a Real Tech Support Interaction
- 🧰 How to Stay Protected Long-Term
- 💬 True Story: How Jane Lost $1,200 in 15 Minutes
- 📌 Related Reads
⚠️ Fake Tech Support Scams: How They Trick You and What to Do About It
That scary pop-up on your screen saying your computer is infected? It might not be what it seems. Here's how tech support scams work and what you need to do immediately.
🧠 What Is a Tech Support Scam?
A tech support scam is when scammers pose as legitimate companies (like Microsoft, Apple, or Norton) to trick you into:
- Granting remote access to your computer
- Paying for fake repairs or antivirus
- Sharing personal, credit card, or banking information
They often use fear, fake pop-ups, and urgent phone calls to get you to act fast — without thinking.
🔍 What It Looks Like in Real Life
🔺 Scenario 1: The Pop-Up Trap
You’re browsing the web when suddenly:
“⚠️ Your computer is infected! Call Microsoft Support immediately: 1-800-XXX-XXXX”
It locks your browser or freezes your screen. A robotic voice may even repeat the warning.
🔺 Scenario 2: The Fake Call
You get a phone call:
“Hi, I’m calling from Windows Support. We detected malware on your device.”
They sound professional and may even know your name. They guide you to install remote-access tools like TeamViewer, AnyDesk, or UltraViewer.
🎣 How They Hook You
Method | Description |
---|---|
Scary pop-ups | Falsely claim your system is infected |
Cold calls | “Tech support” says they’ve found suspicious activity |
Remote access request | Ask you to install tools so they can “fix” your machine |
Fake diagnostics | Show you scary-looking logs that are harmless |
Payment request | Ask for your credit card or bank info for unnecessary services |
💳 What Do They Really Want?
- Your money — via fake service charges or “subscription renewals”
- Your identity — by accessing files, passwords, or saved credentials
- Your trust — so you’ll let them in again or refer them to others
🧯 What to Do If You Encounter a Tech Support Scam
🚫 Step 1: Do NOT Call or Click
- Never call numbers in a pop-up or strange browser alert
- Don’t click on links or download “security tools” they offer
🧹 Step 2: Close the Browser Safely
On Windows:
- Press
Ctrl + Shift + Esc
→ End Task on browser - Clear browser cache & history after restarting
On Mac:
- Press
Cmd + Option + Esc
→ Force Quit browser - Relaunch with
Shift
key held to avoid restoring the session
🧼 Step 3: Run a Full Security Scan
Use trusted antivirus software like:
- Malwarebytes
- Bitdefender
- Norton 360
- Windows Defender (built-in)
📞 Step 4: If You Let Them In...
If you gave remote access or payment:
- Disconnect from the internet immediately
- Uninstall remote software (TeamViewer, AnyDesk)
- Contact your bank to report fraud
- Change all your passwords
- Enable 2FA on critical accounts
🧠 How to Recognize a Real Tech Support Interaction
Real Tech Support | Tech Support Scam |
---|---|
You contact them first | They contact you randomly |
Comes from official website/email | Comes from pop-ups, fake links, unknown calls |
Doesn’t ask for remote access fast | Insists on remote access immediately |
Doesn’t demand urgent payment | Asks for credit card or wire transfer |
Respects your right to disconnect | Gets aggressive or guilt-trips you |
🧰 How to Stay Protected Long-Term
- Use browser popup blockers (e.g. uBlock Origin, AdGuard)
- Install a trusted antivirus
- Educate older relatives — seniors are often targeted
- Enable multi-factor authentication
- Never trust unsolicited tech help
💬 True Story: How Jane Lost $1,200 in 15 Minutes
Jane, a retired teacher, saw a warning on her laptop that her “Windows license was expired.”
A man claiming to be from Microsoft walked her through installing AnyDesk.
He:
- Locked her screen
- Opened her online banking
- Initiated a wire transfer
It was too late before she realized she’d been conned.