How the “Windows Tech Support” Scam Aims to Hijack Your PC and Steal Your Data
Beware the Windows Tech Support Scam: How It Works and How to Protect Yourself
One of the most notorious cons that continues to trap people today is the Windows Tech Support scam. Cold-calling scammers posing as “Windows Tech Support” have a more sinister goal than just offering assistance—they aim to install spyware on your computer or charge you for unnecessary services, all while remotely accessing your device. Sometimes, they even do both. Despite the scam being well-known, it persists. But how exactly does the Windows Tech Support scam operate? To find out, I decided to wait for the call…
Receiving the “Windows Tech Support” Call
I received two such calls in one day. The first came right after lunch, catching me off guard. Busy with work, I burst out laughing when the caller informed me that my computer “could crash at any moment.” The laughter must have thrown them off, as they hung up shortly afterward. But that wasn’t the end of it.
Six hours later, I received another call. This time it was from “Rachel,” or so she said, though her strong Indian accent suggested that wasn’t her real name. What’s in a name? In this case, it’s a calculated bid to appear more down-to-earth and genuine, a desperate attempt to avoid raising any red flags.
The essence of the call was astounding: the script these scammers follow suggests that Microsoft can detect whether your computer has an “infection.” They emphasize that this is not about viruses, which your antivirus can handle; no, they claim it’s about “infections”—a vague term designed to sound alarming but unrelated to actual threats.
The Polished Windows Tech Support “Expert”
That day, I happened to be working on three computers: my usual Surface Pro, a Raspberry Pi, and a Toshiba laptop running Linux Mint. This scam specifically targets Windows computers, and as many know, Linux security issues are far less common.
With Linux Mint booted up in front of me, I couldn’t resist toying with them. When “Rachel” asked me to open the Run dialog box by pressing Windows + R, I told her it wasn’t working. Of course, it didn’t—because Linux doesn’t have a Windows key or Run box.
This Run box step is crucial for the scam to work. It’s used to show the victim “errors” in the Windows Event Viewer logs, which scammers pretend are serious problems.
Using Event Viewer to Trick Victims
Event Viewer logs in Windows can look intimidating to the untrained eye. By opening Event Viewer > Custom Views > Administrative Events, you’ll see various warnings and error messages, marked by red circles with exclamation points and yellow warning triangles. Cyber con artists claim to find risks where none exist, intimidating victims with bogus log files designed to scare them senseless.
But these entries are normal system logs, not infections or viruses.
Variations of the Windows Tech Support Scam
This scam has many variations, all designed to manipulate parts of the Windows operating system that might confuse or alarm someone unfamiliar with technical details. Take a closer look and you’ll discover a array of tactics that are bordering on sneaky.
Opening system files in Notepad and claiming they are “corrupted.”
Pointing to system services disabled by default in Windows and calling them “problems.”
Using Command Prompt to generate a fake malware-related error message.
Claiming Windows Registry keys are dangerous.
Stating that your Windows product key or license is expired.
In all these cases, they offer to “fix” these fake problems—for a fee. Refusing to pay often results in them locking your computer or installing spyware.
My Encounter with the Tech Support Scammer
When my refusal to open the Run box left “Rachel” stumped, she transferred me to “Jonathan,” who presented himself as more of an expert. You can hear in the [recording] how he sticks to the script but with a bit more authority.
These operations rely on passing victims to someone who sounds more “experienced” to pressure them further. In reality, both callers are simply following a scripted playbook.
Their Goal: Your Money and Data
Once they get access to your computer, things escalate. They will “find” infections and offer to remove them for a price, while quietly installing keyloggers or spyware to steal your personal information. Cybercriminals can pilfer sensitive information like your bank account login credentials or email passwords using these tools. They can even hijack your webcam and microphone without you noticing.
Hundreds of thousands of calls like these are made daily from call centers, primarily based in India. No corners were cut, no rules followed, and no mercy shown in this vast and intricate web of deceit, say insiders.
What You Should Do if You Fall for the Scam
If you’ve already fallen for the scam and let them access your computer, act fast:
Disconnect your computer from the internet immediately.
Run an anti-malware scan with tools like Windows Defender.
Cancel or lock your credit cards if you made any payments.
Report the incident to your bank or credit card company to recover any lost funds.
Once the malware is removed, change all your passwords, starting with email and banking accounts.
Inform your local authorities or consumer protection agencies, such as the FTC in the U.S.
Local awareness is crucial, so share this information with people in your area - scammers love to focus on particular regions.
How to Avoid the Scam
If someone calls you out of the blue, claiming they can fix your computer problems, hang up immediately. Even if you’ve requested support, always verify the identity of the caller through official channels before proceeding.
Final Thoughts on the Windows Tech Support Scam
Despite being active for over a decade, the Windows Tech Support scam continues to trick people. Authorities and tech giants alike have identified this as a problem that needs fixing, and their first move has been to撤消 their online ads. However, it still thrives because of its industrial nature and the sheer volume of calls being made.
If you ever receive such a call, hang up. Don’t try to waste their time as I did; while you may save yourself or someone else, thousands of others are being targeted at the same moment. Fight back by reporting the scam to the authorities - this helps to build a solid case against these con artists.
Know your enemy: staying informed is your strongest defense against these scammers.Stay alert and you’ll be shielding yourself and those around you from the nasty consequences of their deceit.