Tech Support Scams

🖥️ Tech Support Scams: What You Need to Know and How to Avoid Them

Tech support scams are among the most dangerous forms of fraud because they mix psychological manipulation with direct access to your devices.
Victims are often tricked into installing malware, granting remote access, or paying expensive “repair fees” to criminals.

If you’re new to fraud prevention, start with our main Fraud & Scams guide to learn the foundations.


🧭 What Is a Tech Support Scam?

A tech support scam occurs when someone pretending to be a computer expert claims there is a problem with your device. Their goal is to:

  • Steal money
  • Install malware
  • Gain remote access
  • Steal personal or financial data

They may impersonate:

  • Microsoft
  • Apple
  • Google
  • Antivirus companies
  • Internet providers
  • Banking security teams

Many of the persuasion techniques used match those in our Social Engineering guide.


📱 How Tech Support Scams Usually Begin

Scammers commonly use:

✔ Fake pop-up warnings

Messages saying:

  • “Your computer is infected!”
  • “Critical alert detected!”
  • “Virus found — call support immediately!”

These pop-ups are designed to scare you.


✔ Unsolicited phone calls

Attackers claim to be from:

  • Microsoft
  • Apple
  • Amazon
  • Your internet provider

No legitimate company calls you out of nowhere to fix your computer.


✔ Phishing emails

Emails pretending to be:

  • Security alerts
  • Billing notices
  • Usage warnings

Phishing links are explained more deeply in our Social Engineering section.


✔ Fake websites

Scammers set up pages that look like:

  • Microsoft Support
  • Apple Support
  • Antivirus dashboards

These sites prompt you to call a fake support number.


🚨 What Scammers Want You to Do

Tech support scammers will try to convince you to:

1️⃣ Install remote access software

Tools like:

  • AnyDesk
  • TeamViewer
  • Quick Assist
  • RemotePC

Once connected, they can:

  • Steal files
  • View your screen
  • Install malware
  • Access your accounts

This often leads to ransomware infections described in Malware & System Defense.


2️⃣ Pay fake repair fees

They may ask for:

  • Gift cards
  • Crypto
  • Bank transfers
  • “Verification fees”
  • “Subscription renewals”

See why gift cards are a major scam vector in our Gift Card Scams guide.


3️⃣ Provide sensitive info

Such as:

  • Bank details
  • Email passwords
  • Social media passwords
  • Identification documents

4️⃣ Install malware

They might trick you into downloading:

  • Keyloggers
  • Spyware
  • Fake antivirus software
  • Ransomware

Learn how these threats work in Malware & System Defense.


🚩 Red Flags of a Tech Support Scam

Be cautious if:

  • You receive a sudden pop-up urging immediate action
  • A support agent calls you unexpectedly
  • You’re told to install remote access software
  • The caller uses fear or urgency
  • You’re asked to pay with gift cards
  • The support website uses a strange URL
  • You’re pressured to stay on the phone

These red flags match patterns in Social Engineering.


🛡️ How to Protect Yourself

✔ Ignore pop-up warnings

Most “virus alerts” in your browser are fake.

✔ Never allow remote access unless YOU initiated the support

Only contact official company support through their verified website.

✔ Don’t trust unsolicited calls

Legitimate tech companies do not call you proactively.

✔ Keep your systems updated

Updates fix security vulnerabilities — see best practices in Cyber & Digital Security.

✔ Use strong passwords + MFA

To protect accounts if malware was installed:


🛑 What to Do If You Fell for a Tech Support Scam

1️⃣ Disconnect your computer from the Internet

This stops further remote access.

2️⃣ Remove remote access software

Uninstall AnyDesk, TeamViewer, or any tool you did not install intentionally.

3️⃣ Change all your passwords

Especially for email and banking.

4️⃣ Enable MFA

See our full guide:
Multi-Factor Authentication

5️⃣ Scan your device

Use reliable tools from Malware & System Defense.

6️⃣ Contact your bank

If you paid money, request a chargeback or fraud hold.

7️⃣ Monitor accounts for suspicious activity

Look for:

  • Unknown logins
  • New devices
  • Password reset attempts

📚 Summary

Tech support scams rely on fear, urgency, and impersonation.
But once you recognize the red flags — fake warnings, unsolicited calls, pressure to install software — you can easily avoid them.

To continue improving your fraud awareness, explore: