Tech Support Scams Steal Millions

There have been over 2,00 reports of computer software service fraud made to UK Action Fraud in November 2020. Victims reported losing a total of £2,148,976. This is a 22% increase compared to the previous month October.The criminals operate by often using bogus ‘Computer Software Tech Support’ phone calls.
 
It might appear that someone from Microsoft or Apple calling you and telling you there is a problem with your device. Or it might be a fraudsters asking for credit card information to ‘validate your software’, e.g. validating your windows software. 
 
People need to be aware of the risk of fraud, especially  as there is a lot of other computer software service scams you need to look out for. Fraudsters often use the names of well-known companies to commit their crime, as it makes their communication with you seem legitimate. This is why it’s important to think twice before giving out any personal information.
 
Action Fraud has received reports of criminals cold calling victims purporting to be calling from well-known Intenet Servie Providers (ISP) primarily, claiming that the victim has a problem with their computer, router or internet. The suspect persuades the victim to download and connect via a Remote Access Tool (RAT), allowing the suspect to gain access to the victim’s computer or mobile phone. Some reports also state that criminals have been using browser pop-up windows to initiate contact with victims.
 
Victims are then persuaded to log into their online banking to receive a refund from the broadband provider as a form of compensation. This allows the suspect access to the victim’s bank account, and the ability to move funds out of the victims account into a UK mule account. 
 
There has also been an increase in the variety of service providers being impersonated, with multiple providers being affected.
 
Always Remember:
  • Genuine organisations would never contact you out of the blue to ask for personal or financial details, such as your PIN or full banking password.
  • Never install any software, or grant remote access to your computer, because of a cold call.
  • Don’t contact companies promoting tech support services via browser pop-ups.
  • Hang up on any callers that claim they can get your money back for you.
  • If you have made a payment, contact your bank immediately. They can help you prevent any further losses.
  • If you granted remote access to your computer, seek technical support to remove any unwanted software. If you need tech advice, look for reviews online first or ask friends for recommendations.
If you think you’ve been a victim of fraud, report it to Action Fraud online at actionfraud.police.uk or by calling 0300 123 2040.
 
Action Fraud:         Action Fraud
 
You Might Also Read: 
 
A Christmas Warning For Online Shoppers:
 
« The End Of The American Cyber Empire
Advanced Threat Detection And Response: Critical Steps »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

OAS Chain

OAS Chain

OAS Blockchain Renaissance Project presents three platforms that address the major challenges of public blockchain, private blockchain, and IoT security.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.