Skip to Content

In these scams, criminals pose as technical or customer support/service.

They may impersonate any type of personnel appearing to offer support or assistance for the following:

  • computer/virus support
  • virus software renewal
  • banking
  • online shopping websites
  • utility companies
  • security (including virus software renewal)
  • GPS
  • printer
  • cable and internet companies
  • cryptocurrency exchanges

How the scam works

Scammers—some working out of fraudulent call center across the globe—pose as representatives from legitimate companies, such as financial institutions, utility companies, or cryptocurrency exchanges.

They tell you that there’s some sort of issue with your device or account. They try to reach you in a number of ways, including:

  • Unsolicited phone calls or text messages claiming to be from tech support
  • Internet pop-up windows telling you to call a tech support number
  • Websites or online ads advertising a tech support number
  • financial institutions, utility companies, or cryptocurrency exchanges

However the scammer gets your attention, they’ll inform you that they can fix the issue for you—for a fee—and that you have to act fast. Scammers may ask you to wire cash, send a gift card, or even transfer cryptocurrency as payment. Once you grant the scammer remote access to your computer or your account, they’ll steal your personal information and/or money.

Unfortunately, many people in this situation don’t realize they’re being scammed until it’s too late.

How to protect yourself

  • Slow down and think. Scammers deliberately create a sense of urgency and panic within victims to convince them to act immediately.
  • Know that legitimate companies will never call you and offer tech support out of the blue. If you get a call like this, hang up.
  • Never let someone claiming to be tech support to have remote access to your computer or other device. These scammers often get a victim on the phone and send them a link to download malicious software on their computer. Once that scammer is in your computer, they have access to all of your personal information and files and can potentially drain your bank accounts, too.
  • Keep your virus scan software up to date on your computers to help eliminate pop-ups and malicious software being installed on your computer.

If you’re a victim

  • File a complaint at the FBI’s Internet Crime Complant Center (IC3) at ic3.gov.
  • Run up to date virus scan software to check for potentially malicious software installed by the scammers. Consider having your computer professionally cleaned.
  • Contact your financial institutions immediately. Take steps to protect your identity and your accounts.
  • Change all passwords if the scammer had access to your device.
  • Expect to be contacted again. Scammers often share victim information.
  • Keep all original documentation, emails, faxes, and logs of communications.

Information provided by the Federal Bureau of Investigation.