Tech Support Scams Steal Millions

There have been over 2,00 reports of computer software service fraud made to UK Action Fraud in November 2020. Victims reported losing a total of £2,148,976. This is a 22% increase compared to the previous month October.The criminals operate by often using bogus ‘Computer Software Tech Support’ phone calls.
 
It might appear that someone from Microsoft or Apple calling you and telling you there is a problem with your device. Or it might be a fraudsters asking for credit card information to ‘validate your software’, e.g. validating your windows software. 
 
People need to be aware of the risk of fraud, especially  as there is a lot of other computer software service scams you need to look out for. Fraudsters often use the names of well-known companies to commit their crime, as it makes their communication with you seem legitimate. This is why it’s important to think twice before giving out any personal information.
 
Action Fraud has received reports of criminals cold calling victims purporting to be calling from well-known Intenet Servie Providers (ISP) primarily, claiming that the victim has a problem with their computer, router or internet. The suspect persuades the victim to download and connect via a Remote Access Tool (RAT), allowing the suspect to gain access to the victim’s computer or mobile phone. Some reports also state that criminals have been using browser pop-up windows to initiate contact with victims.
 
Victims are then persuaded to log into their online banking to receive a refund from the broadband provider as a form of compensation. This allows the suspect access to the victim’s bank account, and the ability to move funds out of the victims account into a UK mule account. 
 
There has also been an increase in the variety of service providers being impersonated, with multiple providers being affected.
 
Always Remember:
  • Genuine organisations would never contact you out of the blue to ask for personal or financial details, such as your PIN or full banking password.
  • Never install any software, or grant remote access to your computer, because of a cold call.
  • Don’t contact companies promoting tech support services via browser pop-ups.
  • Hang up on any callers that claim they can get your money back for you.
  • If you have made a payment, contact your bank immediately. They can help you prevent any further losses.
  • If you granted remote access to your computer, seek technical support to remove any unwanted software. If you need tech advice, look for reviews online first or ask friends for recommendations.
If you think you’ve been a victim of fraud, report it to Action Fraud online at actionfraud.police.uk or by calling 0300 123 2040.
 
Action Fraud:         Action Fraud
 
You Might Also Read: 
 
A Christmas Warning For Online Shoppers:
 
« The End Of The American Cyber Empire
Advanced Threat Detection And Response: Critical Steps »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

IQ Solutions

IQ Solutions

IQ Solutions is a Digital Integrator and an ICT Services Provider, focusing on innovative Cyber Secured ICT managed solutions tailored to the needs of the Maritime Industry.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.