Tech Support Scams Steal Millions

There have been over 2,00 reports of computer software service fraud made to UK Action Fraud in November 2020. Victims reported losing a total of £2,148,976. This is a 22% increase compared to the previous month October.The criminals operate by often using bogus ‘Computer Software Tech Support’ phone calls.
 
It might appear that someone from Microsoft or Apple calling you and telling you there is a problem with your device. Or it might be a fraudsters asking for credit card information to ‘validate your software’, e.g. validating your windows software. 
 
People need to be aware of the risk of fraud, especially  as there is a lot of other computer software service scams you need to look out for. Fraudsters often use the names of well-known companies to commit their crime, as it makes their communication with you seem legitimate. This is why it’s important to think twice before giving out any personal information.
 
Action Fraud has received reports of criminals cold calling victims purporting to be calling from well-known Intenet Servie Providers (ISP) primarily, claiming that the victim has a problem with their computer, router or internet. The suspect persuades the victim to download and connect via a Remote Access Tool (RAT), allowing the suspect to gain access to the victim’s computer or mobile phone. Some reports also state that criminals have been using browser pop-up windows to initiate contact with victims.
 
Victims are then persuaded to log into their online banking to receive a refund from the broadband provider as a form of compensation. This allows the suspect access to the victim’s bank account, and the ability to move funds out of the victims account into a UK mule account. 
 
There has also been an increase in the variety of service providers being impersonated, with multiple providers being affected.
 
Always Remember:
  • Genuine organisations would never contact you out of the blue to ask for personal or financial details, such as your PIN or full banking password.
  • Never install any software, or grant remote access to your computer, because of a cold call.
  • Don’t contact companies promoting tech support services via browser pop-ups.
  • Hang up on any callers that claim they can get your money back for you.
  • If you have made a payment, contact your bank immediately. They can help you prevent any further losses.
  • If you granted remote access to your computer, seek technical support to remove any unwanted software. If you need tech advice, look for reviews online first or ask friends for recommendations.
If you think you’ve been a victim of fraud, report it to Action Fraud online at actionfraud.police.uk or by calling 0300 123 2040.
 
Action Fraud:         Action Fraud
 
You Might Also Read: 
 
A Christmas Warning For Online Shoppers:
 
« The End Of The American Cyber Empire
Advanced Threat Detection And Response: Critical Steps »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Avint

Avint

Avint delivers transformational cybersecurity solutions that help both commercial and government entities achieve mission success.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.