Tech Support Scams

Tech support fraud occurs when the subject claims to be associated with a computer software or security company, or even a cable or Internet company, offering technical support to the victim. Phony tech support companies utilize several different methods to contact or lure their victims. This list is not all inclusive, as the subjects are always varying their schemes such as:
  • Cold calls
  • Pop-up or locked screens
  • The subject pays to have their company websites appear in the top of search results when a victim searches for technical support.
  • URL Hijacking / Typosquatting: The subject relies on mistakes made by the victim when entering a URL, which either causes an “error” or redirects to the subject’s website.

Once the phony tech support company or representative makes verbal contact with the victim, the subject tries to convince the victim to provide remote access to their device. Once the subject has control, additional criminal activity occurs. For example: The subject takes control of the victim’s device and/or bank account, and will not release control until the victim pays a ransom.
  • The subject accesses computer files containing financial accounts, passwords, or personal data (health records, social security numbers, etc.).
  • The subject intentionally installs viruses on the device.
  • The subject threatens to destroy the victim’s computer or continues to call in a harassing manner.

Scammers have been peddling bogus security software for years. They set up fake websites, offer free “security” scans, and send alarming messages to try to convince you that your computer is infected. Then, they try to sell you software to fix the problem. At best, the software is worthless or available elsewhere for free. At worst, it could be malware — software designed to give criminals access to your computer and your personal information.

The latest version of the scam begins with a phone call. Scammers can get your name and other basic information from public directories. They might even guess what computer software you’re using.

Once they have you on the phone, they often try to gain your trust by pretending to be associated with well-known companies or confusing you with a barrage of technical terms. They may ask you to go to your computer and perform a series of complex tasks. Sometimes, they target legitimate computer files and claim that they are viruses. Their tactics are designed to scare you into believing they can help fix your “problem.”

Once they’ve gained your trust, they may:

  • ask you to give them remote access to your computer and then make changes to your settings that could leave your computer vulnerable
  • try to enroll you in a worthless computer maintenance or warranty program
  • ask for credit card information so they can bill you for phony services — or services you could get elsewhere for free
  • trick you into installing malware that could steal sensitive data, like user names and passwords
  • direct you to websites and ask you to enter your credit card number and other personal information
Fraudsters may also pose as the Bank.
Learn more about ongoing scams

The information and resources above and within the articles are provided for your convenience through eFraud Prevention and should not be considered an endorsement of products, services or information provided, or an assurance of security or privacy provided at the linked site. Bristol County Savings Bank does not own or operate these sites and does not guarantee the accuracy, completeness or timeliness of the information contained therein. We encourage you to review their privacy and security policies which may differ from Bristol County Savings Bank.  Bristol County Savings Bank assumes no liability for any loss or damage resulting from any reliance on the material provided.