Technical support scam

Last updated

Example of a technical support scam popup Example of a technical support scam popup.png
Example of a technical support scam popup

A technical support scam, or tech support scam, is a type of scam in which a scammer claims to offer a legitimate technical support service. Victims contact scammers in a variety of ways, often through fake pop-ups resembling error messages or via fake "help lines" advertised on websites owned by the scammers. Technical support scammers use social engineering and a variety of confidence tricks to persuade their victim of the presence of problems on their computer or mobile device, such as a malware infection, when there are no issues with the victim's device. The scammer will then persuade the victim to pay to fix the fictitious "problems" that they claim to have found. Payment is made to the scammer via gift cards or cryptocurrency, which are hard to trace and have few consumer protections in place. Technical support scams have occurred as early as 2008. A 2017 study of technical support scams found that of the IPs that could be geolocated, 85% could be traced to locations in India, 7% to locations in the United States and 3% to locations in Costa Rica. Research into tech support scams suggests that millennials and those in generation Z have the highest exposure to such scams; however, senior citizens are more likely to fall for these scams and lose money to them. Technical support scams were named by Norton as the top phishing threat to consumers in October 2021; Microsoft found that 60% of consumers who took part in a survey had been exposed to a technical support scam within the previous twelve months. Responses to technical support scams include lawsuits brought against companies responsible for running fraudulent call centres and scam baiting.

Contents

Origin and distribution

The first tech support scams were recorded in 2008. [1] [2] Technical support scams have been seen in a variety of countries, including the United States, [3] Canada, [4] United Kingdom, [1] Ireland, [5] Australia, [6] [7] New Zealand, [8] India, and South Africa. [9] [10]

A 2017 study of technical support scams published at the NDSS Symposium found that, of the tech support scams in which the IPs involved could be geolocated, 85% could be traced to locations in India, 7% to locations in the United States and 3% to locations in Costa Rica. [11] India has millions of English speakers who are competing for relatively few jobs. One municipality had 114 jobs and received 19,000 applicants. [12] This high level of unemployment serves as an incentive for tech scamming jobs, which are often well-paid. [13] Additionally, scammers exploit the levels of unemployment by offering jobs to people desperate to be employed. [12] Many scammers do not realise they are applying and being trained for tech support scam jobs, [14] but many decide to stay after finding out the nature of their job as they feel it is too late to back out of the job and change careers. [14] Scammers are forced to choose between keeping their job or becoming jobless. [12] Some scammers convince themselves that they are targeting wealthy people that have money to spare, which justifies their theft, [14] whilst others see their job as generating "easy money". [13] [14] Some scammers rationalize that the victim needs an anti-virus anyway and therefore, it is acceptable to tell the victim lies and charge them for technical support or to charge them for an anti-virus.

Operation

Technical support scams rely on social engineering to persuade victims that their device is infected with malware. [15] [16] Scammers use a variety of confidence tricks to persuade the victim to install remote desktop software, with which the scammer can then take control of the victim's computer. With this access, the scammer may then launch various Windows components and utilities (such as the Event Viewer), install third-party utilities (such as rogue security software) and perform other tasks in an effort to convince the victim that the computer has critical problems that must be remediated, such as infection with a virus. Scammers target a variety of people, though research by Microsoft suggests that millennials (defined by Microsoft as age 24-37) and people part of generation Z (age 18-23) have the highest exposure to tech support scams and the Federal Trade Commission has found that seniors (age 60 and over) are more likely to lose money to tech support scams. [17] [18] The scammer will urge the victim to pay so the "issues" can be fixed. [1] [19] [20]

Initiation

A Recent Changes page from a MediaWiki site affected by technical support scammers promoting fake "help lines" MediaWiki recent changes spam by cold-callers.png
A Recent Changes page from a MediaWiki site affected by technical support scammers promoting fake "help lines"

Technical support scams can begin in a variety of ways. Some variants of the scam are initiated using pop-up advertising on infected websites or via cybersquatting of major websites. The victim is shown pop-ups which resemble legitimate error messages such as a Blue Screen of Death [21] [22] [23] and freeze the victim's web browser. [24] [25] The pop-up instructs the victim to call the scammers via a phone number to "fix the error". Technical support scams can also be initiated via cold calls. These are usually robocalls which claim to be associated with a legitimate third party such as Apple Inc.. [26] [19] Technical support scams can also attract victims by purchasing keyword advertising on major search engines for phrases such as "Microsoft support". Victims who click on these adverts are taken to web pages containing the scammer's phone numbers. [27] [28] In some cases, mass emailing is used. The email tends to state that a certain product has been purchased using their Amazon account and contact a certain telephone number if this is an error.

Confidence tricks

Once a victim has contacted a scammer, the scammer will usually instruct them to download and install a remote access program such as TeamViewer, AnyDesk, LogMeIn or GoToAssist. [21] [29] The scammer convinces the victim to provide them with the credentials required to initiate a remote-control session, giving the scammer complete control of the victim's desktop. [1] The scammer will not tell the victim that he is using a remote control software and that the purpose is to gain access to the victim’s PC. The scammer will say "this is for connecting you to our secure server" or "I am going to give you a secure code" which in reality is just an ID number used by the remote desktop software package.

After gaining access, the scammer attempts to convince the victim that the computer is suffering from problems that must be repaired. They will use several methods to misrepresent the content and significance of common Windows tools and system directories as evidence of malicious activity, such as viruses and other malware. [21] These tricks are meant to target victims who may be unfamiliar with the actual uses of these tools, such as inexperienced users and senior citizens. [1] [26] [30] The scammer then coaxes the victim into paying for the scammer's services and/or software, which they claim is designed to "repair" or "clean" the computer but is either malicious or simply does nothing at all. [31]

Payment and impact

The preferred method of payment in a technical support scam is via gift cards. [41] Gift cards are favoured by scammers because they are readily available to buy and have less consumer protections in place that could allow the victim to reclaim their money back. Additionally, the usage of gift cards as payment allows the scammers to extract money quickly whilst remaining anonymous. [42] [43] Tech support scammers have also been known to ask for payment in the form of cryptocurrency, cheques and direct bank transfers made through automated clearing house (the latter only gives victims 60 days to recover their funds). [44]

If a victim refuses to follow the scammer's instructions or to pay them, scammers have been known to resort to insulting [45] and threatening [46] [47] their victim to procure payment. Scammers may also resort to bullying, coercion, threats and other forms of intimidation and psychological abuse towards their target in an effort to undermine the victim's ability to think clearly, making them more likely to be forced further into the scam. [48] Crimes threatened to be inflicted on victims or their families by scammers have ranged from theft, fraud and extortion, [49] to serious crimes such as rape [50] and murder. [45] Canadian citizen Jakob Dulisse reported to CBC in 2019 that, upon asking a scammer who made contact with him as to why he had been targeted, the scammer responded with a death threat; 'Anglo people who travel to the country' (India) were 'cut up in little pieces and thrown in the river.' [46] [51] Scammers have also been known to lock uncooperative victims out of their computer using the syskey utility (present only in Windows versions previous to Windows 10) [52] or third party applications which they install on the victim's computer, [49] [53] [54] and to delete documents and/or programs essential to the operation of the victim's computer if they do not receive payment. [32] On Windows 10 and 11, since Microsoft removed the syskey utility, scammers will change the user’s account password. The scammer will open the Control Panel, go into user settings and click on change password, and the scammer will ask the user to type in his password in the old password field. The scammer will then create a password that only he knows and will reboot the computer. The user won’t be able to log into his PC unless he pays the scammer.

Microsoft commissioned a survey by YouGov across 16 countries in July 2021 to research tech support scams and their impact on consumers. The survey found that approximately 60% of consumers who participated had been exposed to a technical support scam within the last 12 months. [16] Victims reported losing an average of 200 USD to the scammers and many faced repeated interactions from other scammers once they had been successfully scammed. [16] Norton named technical support scams as the top phishing threat to consumers in October 2021, having blocked over 12.3 million tech support scam URLs between July and September 2021. [55]

Response

Legal action has been taken against some companies carrying out technical support scams. [56] In December 2014, Microsoft filed a lawsuit against a California-based company operating such scams for "misusing Microsoft's name and trademarks" and "creating security issues for victims by gaining access to their computers and installing malicious software, including a password grabber that could provide access to personal and financial information". [57] In December 2015, the state of Washington sued the firm iYogi for scamming consumers and making false claims in order to scare the users into buying iYogi's diagnostic software. [58] iYogi was also accused of falsely claiming that they were affiliated with Microsoft, Hewlett-Packard and Apple. [59]

In September 2011, Microsoft dropped gold partner Comantra from its Microsoft Partner Network following accusations of involvement in cold-call technical-support scams. [60] However, the ease with which companies that carry out technical support scams can be launched makes it difficult to prevent tech support scams from taking place. [61]

Major search engines such as Bing and Google have taken steps to restrict the promotion of fake technical support websites through keyword advertising. [62] [63] Microsoft-owned advertising network Bing Ads (which services ad sales on Bing and Yahoo! Search engines) [64] amended its terms of service in May 2016 to prohibit the advertising of third-party technical support services or ads claiming to "provide a service that can only be provided by the actual owner of the products or service advertised". [62] [63] Google announced a verification program in 2018 in an attempt to restrict advertising for third-party tech support to legitimate companies. [65]

Scam baiting

Tech support scammers are regularly targeted by scam baiting, [45] with individuals seeking to raise awareness of these scams by uploading recordings on platforms like YouTube, cause scammers inconvenience by wasting their time and protect potential victims. A good example of this is the YouTube community Scammer Payback [66] [67]

Advanced scam baiters may infiltrate the scammer's computer, and potentially disable it by deploying remote access trojans, distributed denial of service attacks and destructive malware. [68] Scam baiters may also attempt to lure scammers into exposing their unethical practices by leaving dummy files or malware disguised as confidential information [69] such as credit/debit card information and passwords on a virtual machine, which the scammer may attempt to steal, only to become infected. [45] Sensitive information important to carrying out further investigations by a law enforcement agency may be retrieved, and additional information on the rogue firm may then be posted or compiled online to warn potential victims. [69]

In March 2020, an anonymous YouTuber under the alias Jim Browning successfully infiltrated and gathered drone and CCTV footage of a fraudulent call centre scam operation through the help of fellow YouTube personality Karl Rock. Through the aid of the British documentary programme Panorama , a police raid was carried out when the documentary was brought to the attention of assistant police commissioner Karan Goel, [70] leading to the arrest of call centre operator Amit Chauhan who also operated a fraudulent travel agency under the name "Faremart Travels". [71]

See also

Related Research Articles

Scam baiting is a form of internet vigilantism primarily used towards advance-fee fraud, IRS impersonation scams, technical support scams, pension scams, and consumer financial fraud.

<span class="mw-page-title-main">Syskey</span> Discontinued Windows NT component

The SAM Lock Tool, better known as Syskey, is a discontinued component of Windows NT that encrypts the Security Account Manager (SAM) database using a 128-bit RC4 encryption key.

<span class="mw-page-title-main">Scareware</span> Malware designed to elicit fear, shock, or anxiety

Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. Usually the virus is fictional and the software is non-functional or malware itself. According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. In the first half of 2009, the APWG identified a 585% increase in scareware programs.

Ransomware is a type of malware that permanently blocks access to the victim's personal data unless a "ransom" is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem, and difficult-to-trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

<span class="mw-page-title-main">Malicious Software Removal Tool</span> Software Tool

Microsoft Windows Malicious Software Removal Tool (MSRT) is a freeware second-opinion malware scanner that Microsoft's Windows Update downloads and runs on Windows computers each month, independent of the installed antivirus software. First released on January 13, 2005, MSRT does not offer real-time protection. It scans its host computer for specific, widespread malware, and tries to eliminate the infection. Outside its monthly deployment schedule, it can be separately downloaded from Microsoft.

<span class="mw-page-title-main">Virus hoax</span> Message warning of a non-existent computer virus

A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipients to forward it to everyone they know, but it can also be in the form of a pop-up window.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

The Client/Server Runtime Subsystem, or csrss.exe, is a component of the Windows NT family of operating systems that provides the user mode side of the Win32 subsystem. In modern versions of Windows, it is primarily involved with process and thread management, console window handling, side-by-side assembly loading and the shutdown process. Historically, it had also been responsible for window management and graphics rendering, however, these operations have been moved to kernel mode starting with Windows NT 4.0 to improve performance.

Telemarketing fraud is fraudulent selling conducted over the telephone. The term is also used for telephone fraud not involving selling.

In computing, the term remote desktop refers to a software- or operating system feature that allows a personal computer's desktop environment to be run remotely from one system, while being displayed on a separate client device. Remote desktop applications have varying features. Some allow attaching to an existing user's session and "remote controlling", either displaying the remote control session or blanking the screen. Taking over a desktop remotely is a form of remote administration.

Koobface is a network worm that attacks Microsoft Windows, Mac OS X, and Linux platforms. This worm originally targeted users of networking websites such as Facebook, Skype, Yahoo Messenger, and email websites such as GMail, Yahoo Mail, and AOL Mail. It also targets other networking websites, such as MySpace, Twitter, and it can infect other devices on the same local network. Technical support scammers also fraudulently claim to their intended victims that they have a Koobface infection on their computer by using fake popups and using built-in Windows programs.

<span class="mw-page-title-main">Malwarebytes</span> Internet security company

Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia; Bastia Umbra, Italy; and Cork, Ireland.

Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek. Similarly to Koobface, Zeus has also been used to trick victims of technical support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected.

<span class="mw-page-title-main">Ammyy</span>


Ammyy was a company which created the remote desktop software called Ammyy Admin. It was often used by scammers who cold-call homes to try to gain access to their computer.

Tiny Banker Trojan, also called Tinba, is a malware program that targets financial institution websites. It is a modified form of an older form of viruses known as Banker Trojans, yet it is much smaller in size and more powerful. It works by establishing man-in-the-browser attacks and network sniffing. Since its discovery, it has been found to have infected more than two dozen major banking institutions in the United States, including TD Bank, Chase, HSBC, Wells Fargo, PNC, and Bank of America. It is designed to steal users' sensitive data, such as account login information and banking codes.

AnyDesk is a remote desktop application distributed by AnyDesk Software GmbH. The proprietary software program provides platform-independent remote access to personal computers and other devices running the host application. It offers remote control, file transfer, and VPN functionality. AnyDesk is often used in technical support scams and other remote access scams.

<span class="mw-page-title-main">Kitboga (streamer)</span> American YouTuber, Twitch streamer, and scambaiter

Kitboga is the Internet alias of an American Twitch streamer and YouTuber whose content primarily focuses on scam baiting against phone fraud. His channel has over one million followers on Twitch, and his YouTube channel has over three million subscribers.

<span class="mw-page-title-main">Jim Browning (YouTuber)</span> Northern Irish YouTube personality and scam baiter

Jim Browning is the Internet alias of a software engineer and YouTuber from Northern Ireland whose content focuses on scam baiting and investigating call centres engaging in fraudulent activities. Browning cooperates with other YouTubers and law enforcement when they seek his expertise in investigating and infiltrating scam call centers. Browning has published several journalistic exposé videos highlighting the results of his investigations.

An SSA impersonation scam, or SSA scam, is a class of telecommunications scam targeting citizens of the United States by impersonating Social Security Administration employees. SSA scams are typically initiated through pre-recorded messages, or robocalls, that use social engineering to make victims panic and ensure they follow instructions given to them. In 2018, over 35,000 instances of SSA scam robocalls were reported to the Better Business Bureau with over $10 million lost by victims. Approximately 47% of Americans were subject to an SSA scam robocall during a three-month period between mid- to late 2020, and 21% of seniors were subject to at least three robocalls during the same time period.

An overpayment scam, also known as a refund scam, is a type of confidence trick designed to prey upon victims' good faith. In the most basic form, an overpayment scam consists of a scammer claiming, falsely, to have sent a victim an excess amount of money. The scammer then attempts to convince the victim to return the difference between the sent amount and the intended amount. This scam can take a number of forms, including check overpayment scams and online refund scams.

References

  1. 1 2 3 4 5 Arthur, Charles (July 18, 2012). "Virus phone scam being run from call centres in India". The Guardian . Archived from the original on March 28, 2014. Retrieved March 31, 2014.
  2. "The Anatomy of Tech Support Scams" (PDF). Malwarebytes . October 18, 2016. Archived (PDF) from the original on January 26, 2021. Retrieved January 2, 2021.
  3. Yasir, Sameer; Kumar, Hari (December 17, 2020). "Indian Call-Center Plot Fooled Americans Into Paying Over $14 Million". The New York Times . Archived from the original on January 13, 2022. Retrieved January 13, 2022.
  4. Flanagan, Ryan (November 18, 2019). "32 arrested at Indian call centre that targeted Canadians". CTV News . Archived from the original on January 13, 2022. Retrieved January 13, 2022.
  5. Hennessy, Michelle (August 23, 2014). "Be careful, scammers are still targeting Irish home phone users". TheJournal.ie . Archived from the original on January 13, 2022. Retrieved January 13, 2022.
  6. "Fake Indian call centre attempting to scam Telstra customers". 9news.com.au . February 28, 2019. Archived from the original on January 14, 2022. Retrieved January 14, 2022.
  7. Wright, Patrick (August 3, 2021). "This new scam cost Julia $100k. Here's how it works - ABC Everyday". Australian Broadcasting Corporation . Archived from the original on January 13, 2022. Retrieved January 13, 2022.
  8. Williams, Jolene (February 11, 2011). "Whistle at scam callers say police". NZ Herald . Archived from the original on January 13, 2022. Retrieved January 13, 2022.
  9. Staff writer (October 20, 2021). "Tech support scam on rise in India". Indian Express. IE Online Media Services.
  10. "This is what a Microsoft tech support scam looks like". MyBroadband . March 15, 2016. Archived from the original on January 13, 2022. Retrieved January 13, 2022.
  11. Miramirkhani, Najmeh; Starov, Oleksii; Nikiforakis, Nick (February 27, 2017). Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. NDSS Symposium 2017. San Diego: Internet Society. pp. 1–15. arXiv: 1607.06891 . doi: 10.14722/ndss.2017.23163 .
  12. 1 2 3 Poonam, Snigdha (January 2, 2018). "The scammers gaming India's overcrowded job market". The Guardian . Archived from the original on August 20, 2020. Retrieved January 5, 2022.
  13. 1 2 "The people behind the tech support scams". Which? . December 2, 2017. Retrieved January 20, 2022.
  14. 1 2 3 4 Vaidyanathan, Rajini (March 8, 2020). "Confessions of a call-centre scammer". BBC News . Archived from the original on January 5, 2022. Retrieved January 5, 2022.
  15. "Social Engineering". Malwarebytes . Archived from the original on December 24, 2021. Retrieved December 30, 2021.
  16. 1 2 3 Schrade, Mary (July 21, 2021). "Tech support scams adapt and persist in 2021, per new Microsoft research". Microsoft . Archived from the original on December 30, 2021. Retrieved December 30, 2021.
  17. "Older adults hardest hit by tech support scams". Federal Trade Commission . March 7, 2019. Archived from the original on December 31, 2021. Retrieved December 31, 2021.
  18. "Protecting Older Consumers" (PDF). Federal Trade Commission . October 18, 2020. p. 6. Archived (PDF) from the original on December 7, 2021. Retrieved December 31, 2021.
  19. 1 2 3 4 5 6 7 Segura, Jérôme. "Tech Support Scams - Help & Resource Page | Malwarebytes Unpacked". Malwarebytes . Archived from the original on March 28, 2014. Retrieved March 28, 2014.
  20. Weiss, Gary (June 12, 2019). "How Scammers Use Gift Cards to Steal Your Money". AARP . Archived from the original on November 12, 2020. Retrieved August 1, 2019.
  21. 1 2 3 Miramirkhani, Najmeh; Starov, Oleksii; Nikiforakis, Nick (2016). "Dial One for Scam: A Large-Scale Analysis of Technical Support Scams". Proceedings 2017 Network and Distributed System Security Symposium. arXiv: 1607.06891 . doi:10.14722/ndss.2017.23163 . Retrieved November 28, 2023.
  22. Harley, David (October 7, 2015). "Tech Support Scams: Top of the Pop-Ups". WeLiveSecurity. ESET. Archived from the original on July 27, 2016. Retrieved July 28, 2016.
  23. "Do not respond to scam pop-up messages in your web browser". www.communications.gov.au. Department of Communications and the Arts. October 30, 2015. Archived from the original on April 20, 2016. Retrieved April 19, 2016.
  24. Segura, Jérôme (November 2, 2016). "Tech support scammers abuse bug in HTML5 to freeze computers". Malwarebytes . Archived from the original on December 30, 2021. Retrieved December 30, 2021.
  25. Wang, Samuel (April 29, 2019). "Tech Support Scam Uses Iframe to Freeze Browsers". Trend Micro . Archived from the original on December 30, 2021. Retrieved December 30, 2021.
  26. 1 2 Brodkin, Jon (October 3, 2012). "Hello, I'm definitely not calling from India. Can I take control of your PC?". Ars Technica . Archived from the original on November 21, 2014. Retrieved November 16, 2014.
  27. "Despite Crackdowns, Tech Support Ads In Search Are Still Cause For Consumer Confusion" Archived March 28, 2015, at the Wayback Machine . Search Engine Land, Ginny Marvin on August 5, 2014
  28. "How To Spot, Avoid, and Report Tech Support Scams". Federal Trade Commission . February 15, 2019. Archived from the original on December 18, 2021. Retrieved January 1, 2022.
  29. Brodkin, Jon (November 25, 2013). "Fake tech support scam is trouble for legitimate remote help company". Ars Technica . Archived from the original on December 13, 2017. Retrieved December 31, 2021.
  30. "Microsoft Phone Scams". Which? . Archived from the original on February 13, 2015. Retrieved January 5, 2022.
  31. Graham Scott, Gini (2016). Scammed: Learn from the Biggest Consumer and Money Frauds How Not to Be a Victim. Allworth Press. p. 182. ISBN   978-1-62153-504-1. Archived from the original on February 18, 2019. Retrieved September 15, 2017.
  32. 1 2 3 4 Solon, Olivia (April 11, 2013). "What happens if you play along with a Microsoft 'tech support' scam?". Wired UK . Archived from the original on November 7, 2014. Retrieved November 10, 2014.
  33. Harley, David (July 19, 2011). "Support desk scams: CLSID not unique". WeLiveSecurity. ESET. Archived from the original on October 23, 2014. Retrieved November 15, 2014.
  34. Harley, David (November 30, 2011). "Support-Scammer Tricks". WeLiveSecurity. ESET. Archived from the original on December 25, 2014. Retrieved November 15, 2014.
  35. Gallagher, Sean (January 27, 2021). ""You took so much time to joke me"—two hours trolling a Windows support scammer". Ars Technica . Archived from the original on August 2, 2018. Retrieved December 31, 2021.
  36. Hunt, Troy (February 21, 2012). "Scamming the scammers – catching the virus call centre scammers red-handed". Archived from the original on April 7, 2014. Retrieved April 1, 2014.
  37. Jim Browning (August 4, 2018), This is why you never let anyone remotely access your computer, archived from the original on August 5, 2018, retrieved September 9, 2018
  38. Anderson, Nate (May 19, 2014). "Inside the US government's war on tech support scammers". Ars Technica . Archived from the original on December 31, 2021. Retrieved December 31, 2021.
  39. Farivar, Cyrus (July 28, 2017). "How a podcaster managed to confront his tech support scammer, in person". Ars Technica . Archived from the original on December 31, 2021. Retrieved December 31, 2021.
  40. Greenberg, Andy (March 13, 2017). "Listen to 'Tech Support' Scam Calls That Bilk Millions Out of Victims". Wired. ISSN   1059-1028. Archived from the original on December 8, 2021. Retrieved December 31, 2021.
  41. "Protecting Older Consumers" (PDF). Federal Trade Commission . October 18, 2020. p. 12. Archived (PDF) from the original on December 7, 2021. Retrieved January 1, 2022.
  42. Fowler, Bree (December 3, 2021). "Are you being scammed? Here's how to know and what to do". CNET . Archived from the original on January 2, 2022. Retrieved January 2, 2022.
  43. Fletcher, Emma (December 8, 2021). "Scammers prefer gift cards, but not just any card will do". Federal Trade Commission . Archived from the original on January 1, 2022. Retrieved January 1, 2022.
  44. Tsing, William (March 30, 2017). "Tech support scammers and their banking woes". Malwarebytes . Archived from the original on January 2, 2022. Retrieved January 2, 2022.
  45. 1 2 3 4 "A guide to trolling a tech support scammer". Wired UK . October 15, 2012. Archived from the original on July 7, 2018. Retrieved October 3, 2018.
  46. 1 2 Brodkin, Jon (March 4, 2015). "Tech support scammer threatened to kill man when scam call backfired". Ars Technica . Archived from the original on November 15, 2019. Retrieved November 15, 2019.
  47. "Kitboga: The Internet star giving scammers a taste of their own medicine | CTV News". www.ctvnews.ca. April 4, 2019. Archived from the original on November 14, 2019. Retrieved November 15, 2019.
  48. "Tech support scammers". www.selwynfoundation.org.nz. Retrieved December 23, 2023.
  49. 1 2 Bhattacharjee, Yudhijit (January 27, 2021). "Who's Making All Those Scam Calls?". The New York Times . ISSN   0362-4331. Archived from the original on January 27, 2021. Retrieved January 27, 2021.
  50. "Busted scammer resorts to death threats". Naked Security. March 10, 2015. Archived from the original on November 8, 2020. Retrieved January 27, 2021.
  51. "Death threat issued in bogus tech support call". BBC News. March 5, 2015. Archived from the original on October 24, 2019. Retrieved October 24, 2019.
  52. Whittaker, Zack (February 22, 2017). "We talked to Windows tech support scammers. Here's why you shouldn't". ZDNet . Archived from the original on December 31, 2021. Retrieved December 31, 2021.
  53. Osborne, Charlie (February 10, 2020). "Lock My PC takes on tech scammers with free recovery key offering, software withdrawal". ZDNet . Archived from the original on January 1, 2022. Retrieved January 1, 2022.
  54. Spadafora, Anthony (February 10, 2020). "Lock My PC fights tech support scammers with free recovery keys". TechRadar . Archived from the original on January 1, 2022. Retrieved January 1, 2022.
  55. Ramasubramanian, Sowmya (October 27, 2021). "Tech support scams have become top phishing threats, report says". The Hindu . ISSN   0971-751X. Archived from the original on November 29, 2021. Retrieved January 2, 2022.
  56. "Microsoft takes on tech support scammers". BBC News . December 19, 2014. Archived from the original on December 1, 2020. Retrieved January 5, 2021.
  57. Whitney, Lance (December 19, 2014). "Microsoft combats tech support scammers with lawsuit". CNET. Archived from the original on December 21, 2014. Retrieved December 21, 2014.
  58. Washington state sues firm, alleges tech support scam Archived December 21, 2015, at the Wayback Machine , Associated Press , December 16, 2015
  59. "US state accuses tech support firm of scamming users". BBC News . December 17, 2015. Archived from the original on June 25, 2019. Retrieved January 5, 2022.
  60. Arthur, Charles (September 22, 2021). "Microsoft drops partner accused of cold-call scam". The Guardian . Archived from the original on June 30, 2016. Retrieved January 5, 2022.
  61. Poonam, Snigdha; Bansal, Samarth (May 18, 2017). "Scare and sell: Here's how an Indian call centre cheated foreign computer owners". The Hindustan Times . Archived from the original on October 1, 2021. Retrieved January 5, 2022.
  62. 1 2 Tung, Liam (May 13, 2016). "Microsoft to Bing users: No more shady third-party ads for tech support, password recovery". ZDNet . Archived from the original on May 14, 2016. Retrieved May 13, 2016.
  63. 1 2 "Bing bans tech support ads—because they're mostly scams". Ars Technica . May 13, 2016. Archived from the original on May 13, 2016. Retrieved May 13, 2016.
  64. "Microsoft loses exclusivity in shaken up Yahoo search deal". Ars Technica . April 16, 2015. Archived from the original on June 23, 2015. Retrieved June 30, 2015.
  65. Tung, Liam (September 3, 2018). "Google to tech-support scammers: We're about to get even tougher on your ads". ZDNet . Archived from the original on August 19, 2021. Retrieved January 5, 2022.
  66. Whittaker, Jack; Button, Mark (June 21, 2021). "'Scambaiting': why the vigilantes fighting online fraudsters may do more harm than good". The Conversation . Archived from the original on October 10, 2021. Retrieved January 6, 2022.
  67. Bhattacharjee, Yudhijit (January 27, 2021). "Who's Making All Those Scam Calls?". The New York Times . Archived from the original on January 27, 2021. Retrieved January 6, 2022.
  68. Vaas, Lisa (August 15, 2016). "Tech support scammer tricked into installing ransomware". Naked Security. Sophos. Archived from the original on May 15, 2021. Retrieved January 6, 2022.
  69. 1 2 Sherr, Ian (November 30, 2021). "People are fighting back against gift card scammers. Here's how". CNET . Archived from the original on January 1, 2022. Retrieved January 6, 2022.
  70. Dhankhar, Leena (March 4, 2020). "Udyog Vihar call centre duped at least 40,000 in 12 countries; 2 arrested". The Hindustan Times . Archived from the original on March 5, 2020. Retrieved March 5, 2020.
  71. McCarter, Reid (April 3, 2020). "Hacker breaks into scammers' CCTV cameras and computer records". The A.V. Club . Archived from the original on July 29, 2021. Retrieved January 7, 2022.

Further reading