Blog post: Online security

Hello and welcome to Scam Or Reliable!
Product Reviews
Article by René Ronse

Fake tech support scams

Updated on 4 May 2026.

transparent pixel
Fake Tech Support Scam
Every day, thousands of people fall victim to fake technical support scams. These fraudsters pose as agents from Microsoft, Apple, or antivirus companies, claiming that your device is infected or at risk. In reality, their only goal is to gain access to your computer, steal your personal data, and demand payment for fake services. These scams are becoming increasingly sophisticated, targeting both individuals and businesses worldwide.

How tech support scams work

The scam usually begins with an alarming message, a pop-up window, or a phone call:

  • A fake system alert appears on your screen, warning of a “critical virus” or “suspicious activity.”
  • The message urges you to call a so-called “support hotline” immediately for help.
  • On the phone, the fraudster impersonates a legitimate technician from Microsoft, Apple, or another known company.

Once contact is established, the scammer persuades you to install remote access software (such as AnyDesk or TeamViewer) so they can “fix the issue.” From that moment, they can do anything on your device: access your files, passwords, and banking information — or even lock your computer and demand ransom.

Typical red flags

These scams are designed to create panic and gain your trust simultaneously. Look out for:

  • Pop-up messages claiming to come from Microsoft or Apple but containing spelling mistakes or unusual URLs.
  • Phone calls from unknown numbers claiming to have “detected” a virus on your device.
  • Requests to install remote access tools.
  • Demands for immediate payment through gift cards, cryptocurrency, or bank transfers.
  • Technicians refusing to provide official identification or a reference number.

How scammers gain access to your computer

After convincing you that your computer is “infected,” the fraudster typically guides you through the installation of legitimate remote access tools.
With your permission (given unknowingly), they can:

  • Access your system files and browser data.
  • Install spyware or keyloggers.
  • Copy documents containing personal information.
  • Simulate “virus scans” that show fake infection results.
  • Lock your computer or encrypt your data to demand payment for unlocking it.

In some cases, they even create a fake invoice and ask you to pay a “support fee,” often ranging between $100 and $500. Once paid, they disappear — or worse, they come back days later, claiming that a “refund” went wrong and trick you into sending even more money.

Who are the targets?

Although older adults are often the primary victims, no one is immune.
Fraudsters now target younger users through fake antivirus ads, fraudulent browser notifications, and phishing emails pretending to be from Apple, Microsoft, or Google.
Businesses are also affected — especially small companies without dedicated IT departments.

Consequences of a fake support scam

The consequences can be severe:

  • Financial loss: victims may transfer money directly or provide access to online banking.
  • Identity theft: fraudsters often steal personal data (passports, IDs, or bank details) for resale or further scams.
  • Device compromise: once infected, your computer may remain accessible to the hacker even after “disconnection.”
  • Psychological distress: many victims experience guilt or anxiety after realizing they were deceived.

Recent cases and variations

In 2024, the US Federal Trade Commission (FTC) reported a significant increase in fake “Microsoft support” calls, particularly in states such as California and Florida.
The UK’s Report Fraud and National Cyber Security Centre (NCSC) also warn against similar scams involving fake Apple and Norton technicians.
Fraudsters even use local numbers and accents to appear trustworthy.

Common variations include:

  • Fake refund scams (“We owe you a refund for your antivirus subscription”).
  • Browser hijacking pop-ups blocking navigation with false warnings.
  • Fake “security partners” claiming to be working with your bank.

How to protect yourself

The best protection is vigilance and skepticism.
Follow these tips:

  • Never call a number displayed in a pop-up or unsolicited email.
  • Do not allow remote access to anyone who contacts you unexpectedly.
  • Keep your antivirus and operating system up to date.
  • Use reputable sources to contact customer support (official websites only).
  • Ignore threats or pressure tactics claiming “your computer will be blocked.”

If in doubt, disconnect from the internet immediately and seek advice from a trusted technician or an official hotline.

What to do if you’ve been scammed

If you suspect you’ve been a victim of a fake support scam, act quickly:

How to help others avoid these scams

Scammers rely on confusion and panic. Talking about these scams helps protect others.

  • Warn your family, especially elderly relatives who might be less familiar with technology.
  • Share official awareness campaigns from Microsoft, Apple, and cybersecurity authorities.
  • If you receive a scam call, hang up immediately and block the number.
  • Report recurring pop-ups or suspicious websites to your browser provider (Google Chrome, Safari, Edge, Firefox).

Can real companies contact you for technical support?

No legitimate company will ever call you without prior contact.
Microsoft, Apple, and antivirus vendors never initiate unsolicited calls or display pop-ups asking for your number.
Their genuine support channels are always accessible only through official websites, never through random phone numbers or chat windows.

Conclusion

Fake tech support scams exploit trust and fear to gain control of your devices and data.
They can happen to anyone — and they’re becoming increasingly convincing.
By staying cautious, verifying every request, and spreading awareness, you can protect yourself and help others avoid falling into the same trap.
Remember: no genuine technician will ever ask for remote access, payment by gift card, or bank details over the phone.
If in doubt, hang up, close the page, and check directly with the official company website.


Share this Article!