Beware of Fake Virus Scams and Tech Support Scams: Staying Safe in the Digital World

Share This Post

In today’s digital age, technology plays a significant role in our daily lives. While it offers countless benefits, it also comes with its fair share of risks. One of these risks is falling victim to fake virus scams and tech support scams. These scams prey on unsuspecting users, attempting to steal personal information or extort money. This blog post aims to provide an in-depth understanding of the methods scammers use, the information they attempt to gain, and how to better protect against these scams.

 

Methods Scammers Use

 

1. Pop-up Ads and Warnings

 

One of the most common tactics scammers uses is the display of fake pop-up ads and warnings, claiming that your computer has been infected with a virus or malware (Federal Trade Commission, 2021). These pop-ups often appear while browsing the internet, and they may look like genuine alerts from your antivirus software or operating system. Clicking on these ads may lead to the installation of malicious software or direct you to a fake tech support website.

 

Many time the message urges you to call a phone number immediately to get the virus removed. Once you call the number, the person on the other end of the line claims to be a tech support representative from a well-known company, such as Microsoft or Apple. They then tend to ask for remote access to your computer. Once the scammer has access to your computer, they may also install malware or steal your personal information. Otherwise, the caller may claim that they have detected a problem through various tactics they use to make it appear they are doing a fake scan or providing you with fake scary results found within your computer and then offer to fix it for a fee.

 

From here, there are various financial scams they use to get money from you, albeit directly through obtaining a debit or credit card number, checking account information, or they may inform you to purchase a prepaid gift card, especially a service such as iTunes or Google Play Store (see my other article “The Gift Card Scam Epidemic: Understanding Tactics and Protecting Yourself “ that goes into more details on these scams).

 

In summary, they may demand payment for a service that was never needed or performed. In some cases, the scammers may try to convince you to purchase software or services that are unnecessary.

 

Here are a few example images of what some known fake alerts may look like. Again, the images below are FAKE, they are not real messages for your computer and only provided on here as an example for what to be on the lookout for:

 

 

2. Unsolicited Phone Calls

 

Scammers posing as representatives from well-known technology companies, such as Microsoft or Apple, may make unsolicited phone calls claiming that your computer is infected with a virus or experiencing technical issues (Australian Competition & Consumer Commission, 2021). They may offer to help you resolve the problem remotely, which often involves providing them with access to your computer or divulging sensitive information.

 

3. Phishing Emails

 

Phishing emails are another method scammers use to trick users into believing their computer is infected or in need of technical assistance. These emails may appear to come from legitimate sources, such as your antivirus software provider, and often contain links or attachments that, when clicked or opened, install malware onto your device or lead to fake tech support websites (FBI, 2021).

 

4. Rogue Software

 

Scammers may create and distribute rogue software that claims to detect and remove viruses or malware but is, in fact, malicious itself (Symantec, 2021). Once installed, this software may steal personal information or extort money by claiming that your computer is infected and offering to “fix” the issue for a fee.

 

Information Scammers Attempt to Gain

 

Scammers aim to extract valuable information from their victims, including:

 

  1. Personal Information: This may include your full name, address, phone number, and date of birth. They may use this information to commit identity theft or target you for further scams.

 

  1. Financial Information: Scammers may attempt to gain access to your bank account, credit card, or other financial information. This enables them to make unauthorized transactions or sell your information to other criminals.

 

  1. Login Credentials: They may try to obtain your usernames and passwords for various online accounts, such as email, social media, and online banking, giving them unauthorized access to your accounts and sensitive information.

 

  1. Remote Access: Scammers often attempt to gain remote access to your computer, allowing them to search your files, monitor your online activity, and even control your device without your knowledge.

 

How to Protect Against Scams

 

To better protect yourself against fake virus and tech support scams, consider the following:

 

  1. Be cautious of unsolicited phone calls or emails claiming to be from tech support or antivirus companies (Australian Competition & Consumer Commission, 2021). Legitimate companies will not contact you unprovoked to inform you of a virus or technical issue. If you receive a call from someone claiming to be a tech support representative, hang up and call the company directly to verify the legitimacy of the call.

 

  1. Do not click on suspicious links or pop-up ads, as these may lead to malicious websites or install malware onto your device (Federal Trade Commission, 2021).

 

  1. Keep your computer’s operating system, antivirus software, and other applications up to date to minimize the risk of malware infections (FBI, 2021). Use reputable antivirus software like Bitdefender or ESET (our top two recommended software). Other software may include McAfee, Norton, Trend Micro, and several others (see PC Magazines “Best Antivirus Software for 2023” article here: https://www.pcmag.com/picks/the-best-antivirus-protection).

 

  1. Use strong, unique passwords for each of your online accounts, and enable multi two-factor authentication where available (Symantec, 2021).

 

  1. Regularly back up your data to protect against data loss caused by malware or ransomware attacks.

 

  1. Do not give remote access to your computer to anyone you do not know or trust.

 

  1. Be cautious when downloading software or clicking on links from unknown sources.

 

What to Do if You Fall Victim to a Scam

 

 

If you have fallen victim to a fake virus or tech support scam, it is important to take action as soon as possible. Here are some steps you can take:

 

 

  1. Disconnect your computer from the internet.

 

 

  1. Run a virus scan to detect any malware or viruses that may have been installed. Don’t have legitimate software installed? Purchase one online from a reputable company directly or contact a local reputable IT company (such as us at Dayton Allied Business Solutions) where we can help get you the software and protection you need.

 

 

  1. Change your passwords for all accounts that may have been compromised.

 

 

  1. Contact your bank or credit card company to dispute any unauthorized charges. Even if no charges were made that you are aware of, it would not hurt to still make them aware of what just happened. They may be able to suggest other options or place your account in a sort of high alert status, else, as a last resort, the incident is at least documented with them should something arise down the road that is related to the scam.

 

 

  1. Report the scam to the appropriate authorities, such as the Federal Trade Commission and the Internet Crime Complaint Center(IC3). If you had your financial information stolen or money taken, you may likely want to file a local police report as well, to report the fraud.
  2. Contact a reputable and local IT support company like us here at Dayton Allied Business Solutions. Fill out a form on our inquire page by clicking HERE.

 

Conclusion

 

According to an article released by the FBI in late 2022, nationwide, in 2021, 23,903 people reported losing more than $347 million due to tech support scams which is a 137% increase in losses from the previous year. Most victims, almost 60%, reported to be over 60 years old, and experienced 68% of the losses. The reported losses are most likely much higher because older Americans are less likely to report fraud due to the fact that they either don’t know how to report it, are embarrassed, or don’t know they have been scammed.

 

Fake virus scams and tech support scams pose a significant threat to internet users worldwide. By understanding the methods scammers use and the information they attempt to gain, you can take the necessary precautions to safeguard your personal information and devices. Stay vigilant, and always trust your instincts when encountering potential scams.

 

References

 

Australian Competition & Consumer Commission. (2021). Remote access scams. Scamwatch. https://www.scamwatch.gov.au/types-of-scams/attempts-to-gain-your-personal-information/remote-access-scams

 

FBI. (2022, October 18). FBI warns public to beware of tech support scammers targeting financial accounts using remote desktop software. FBI. https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-public-to-beware-of-tech-support-scammers-targeting-financial-accounts-using-remote-desktop-software

 

Federal Trade Commission. (2021). Tech support scams. https://www.consumer.ftc.gov/articles/how-spot-avoid-and-report-tech-support-scams

 

Internet crime complaint center (IC3). Internet Crime Complaint Center(IC3) | File a Complaint. (n.d.). https://www.ic3.gov/Home/FileComplaint

 

Kaspersky. (2021, February 9). How to identify and avoid tech support scams. Retrieved from https://www.kaspersky.com/resource-center/definitions/tech-support-scam

 

Norton. (2021, March 22). How to spot and avoid fake tech support scams. Retrieved from https://us.norton.com/internetsecurity-how-to-spot-and-avoid-fake-tech-support-scams.html

 

Symantec. (2021). How to protect against tech support scams. https://www.symantec.com/blogs/feature-stories/how-protect-against-tech-support-scams

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore