Fraudsters have found a new way to infiltrate firms, compromise security, and scam businesses and individuals out of money—through fake tech support claims.
How it works
- A scammer will contact a business via phone, email, pop-up message, or other methods to convince individuals that there may be a problem with their computer. The perpetrator may attempt to prove their legitimacy by posing as a technician from a well-known software provider (such as Microsoft or Apple), setting up fake websites, or overwhelming individuals with technical jargon.
- Once the attacker has convinced a victim of their credibility, they will try to gain access to sensitive personal or financial data. For example, they might ask their target to install malware, grant remote access to their device, or pay for fake services to “fix” an issue.
Take action to prevent scams
- Confirm and verify the identity of any third parties that request access to systems or that ask them to share financial or personal data.
- Leverage Tips for Preventing Fraud Checklist for best practices and steps to protect data and assets.
- Learn more about this scheme on the FTC website and find out how to initiate a free credit freeze and year-round fraud alerts.