TECH SUPPORT SCAM: The Internet Crime Complaint Center (IC3) – Guideline

<h2>TECH SUPPORT SCAM<&sol;h2>&NewLine;<p>The Internet Crime Complaint Center &lpar;IC3&rpar; is receiving an increase in complaints related to technical support scams&comma; where the subject claims to be an employee &lpar;or an affiliate&rpar; of a major computer software or security company offering technical support to the victim&period; Recent complaints indicate some subjects are claiming to be support for cable and Internet companies to offer assistance with digital cable boxes and connections&comma; modems&comma; and routers&period; The subject claims the company has received notifications of errors&comma; viruses&comma; or security issues from the victim&&num;8217&semi;s internet connection&period; Subjects are also claiming to work on behalf of government agencies to resolve computer viruses and threats from possible foreign countries or terrorist organizations&period; From January 1&comma; 2016&comma; through April 30&comma; 2016&comma; the IC3 received 3&comma;668 complaints with adjusted losses of &dollar;2&comma;268&comma;982&period;<&sol;p>&NewLine;<h3>Technical Details<&sol;h3>&NewLine;<div class&equals;"mh-content-ad"><script async src&equals;"https&colon;&sol;&sol;pagead2&period;googlesyndication&period;com&sol;pagead&sol;js&sol;adsbygoogle&period;js&quest;client&equals;ca-pub-9162800720558968"&NewLine; crossorigin&equals;"anonymous"><&sol;script>&NewLine;<ins class&equals;"adsbygoogle"&NewLine; style&equals;"display&colon;block&semi; text-align&colon;center&semi;"&NewLine; data-ad-layout&equals;"in-article"&NewLine; data-ad-format&equals;"fluid"&NewLine; data-ad-client&equals;"ca-pub-9162800720558968"&NewLine; data-ad-slot&equals;"1081854981"><&sol;ins>&NewLine;<script>&NewLine; &lpar;adsbygoogle &equals; window&period;adsbygoogle &vert;&vert; &lbrack;&rsqb;&rpar;&period;push&lpar;&lbrace;&rcub;&rpar;&semi;&NewLine;<&sol;script><&sol;div>&NewLine;<p>Initial contact with the victims occurs by different methods&period; Any electronic device with Internet capabilities can be affected&period;<&sol;p>&NewLine;<ol>&NewLine;<li>Telephone&colon; This is the traditional contact method&period; Victims receive a &OpenCurlyDoubleQuote;cold” call from a person who claims the victim&&num;8217&semi;s computer is sending error messages and numerous viruses were detected&period; Victims report the subjects have strong foreign accents&period;<&sol;li>&NewLine;<li>Pop-up message&colon; The victim receives an on-screen pop-up message claiming viruses are attacking the device&period; The message includes a phone number to call to receive assistance&period;<&sol;li>&NewLine;<li>Locked screen on a device &lpar;Blue Screen of Death &&num;8211&semi; BSOD&rpar;&colon; Victims report receiving a frozen&comma; locked screen with a phone number and instructions to contact a &lpar;phony&rpar; tech support company&period; Some victims report being redirected to alternate websites before the BSOD occurs&period; This has been particularly noticed when the victim was accessing social media and <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tag&sol;financial-fraud&sol;amp&sol;" title&equals;"financial" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"573">financial<&sol;a> websites&period;<&sol;li>&NewLine;<li>Pop-up messages and locked screens are sometimes accompanied by a recorded&comma; verbal message to contact a phone number for assistance&period;<&sol;li>&NewLine;<&sol;ol>&NewLine;<p>Once the phony tech support company&sol;representative makes verbal contact with the victim&comma; the subject tries to convince the victim to provide remote access to their device&period;<&sol;p>&NewLine;<p>If the device is mobile &lpar;a tablet&comma; smart phone&comma; etc&period;&rpar;&comma; the subject often instructs the victim to connect the device to a computer to be fixed&period; Once the subject is remotely connected to the device&comma; they claim to have found multiple viruses&comma; malware&comma; and&sol;or scareware that can be removed for a fee&period; Fees are collected via a personal debit or credit card&comma; electronic check&comma; wire transfer&comma; or prepaid card&period; A few instances have occurred in which the victim paid by personal check&period;<&sol;p>&NewLine;<h3>Variations and Trends<&sol;h3>&NewLine;<p>An increasingly reported variation of the scam occurs when the subject contacts the victim offering a refund for tech support services previously rendered because the company has closed&period;<&sol;p>&NewLine;<p>The victim is convinced to allow the subject access to their device and to log onto their online bank account to process the refund&period; The subject then has control of the victim&&num;8217&semi;s device and bank account&period; With this access&comma; the subject appears to have &OpenCurlyDoubleQuote;mistakenly” refunded too much money to the victim&&num;8217&semi;s account&comma; and requests the victim wire the difference back to the subject company&period; In reality&comma; the subject transferred funds among the victim&&num;8217&semi;s own accounts &lpar;checking&comma; savings&comma; retirement&comma; etc&period;&rpar; to make it appear as though funds were deposited&period; The victim wires their own money back to the company&comma; not finding out until later that the funds came from one of their own accounts&period; The refunding and wiring process can occur multiple times&comma; which results in the victim losing thousands of dollars&period;<&sol;p>&NewLine;<p>Victims are increasingly reporting subjects are becoming hostile&comma; abusive&comma; and utilizing foul language and threats when being challenged by victims&period;<&sol;p>&NewLine;<h3>Additional Threats<&sol;h3>&NewLine;<p>The tech support scam is an attempt by subjects to gain access to victim devices&period; However&comma; more can happen once a subject is given access to the device&period; For example&colon;<&sol;p>&NewLine;<ul>&NewLine;<li>The subject takes control of the victim&&num;8217&semi;s device and&sol;or bank account&comma; and will not release control until the victim pays a ransom&period;<&sol;li>&NewLine;<li>The subject can access computer files that may contain financial accounts&comma; passwords&comma; and personal data &lpar;health records&comma; social security numbers&comma; etc&period;&rpar;&period;<&sol;li>&NewLine;<li>The subject may intentionally install viruses on the device&period;<&sol;li>&NewLine;<li>The subject threatens to destroy the victim&&num;8217&semi;s computer or continues to call in a harassing manner&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<h3>Defense and Mitigation<&sol;h3>&NewLine;<ul>&NewLine;<li>Recognize the attempt and cease all communication with the subject&period;<&sol;li>&NewLine;<li>Resist the pressure to act quickly&period; The subjects will urge the victim to fast action in order to protect their device&period; The subjects create a sense of urgency to produce fear and lure the victim into immediate action&period;<&sol;li>&NewLine;<li>Do not give unknown&comma; unverified persons remote access to devices or accounts&period; A legitimate software or security company will not directly contact individuals unless the contact is initiated by the customer&period;<&sol;li>&NewLine;<li>Ensure all computer anti-virus&comma; security&comma; and malware protection is up to date&period; Some victims report their anti-virus software provided warnings prior to the attempt&period;<&sol;li>&NewLine;<li>If a victim receives a pop-up or locked screen&comma; shut down the device immediately&period; Victims report that shutting down the device and waiting a short time to restart usually removes the pop-up or screen lock&period;<&sol;li>&NewLine;<li>Should a subject gain access to a device or an account&comma; victims should take precautions to protect their identity&comma; immediately contact their financial institutions to place protection on their accounts&comma; and monitor their accounts and personal information for suspicious activity&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<h3>Filing a Complaint<&sol;h3>&NewLine;<p>Individuals who believe they may be a victim of an online scam &lpar;regardless of dollar amount&rpar; can file a complaint with the IC3 at <a href&equals;"http&colon;&sol;&sol;www&period;ic3&period;gov&sol;">www&period;ic3&period;gov<&sol;a>&period;<&sol;p>&NewLine;<p>To report tech support scams&comma; please be as descriptive as possible in the complaint including&colon;<&sol;p>&NewLine;<ol>&NewLine;<li>Name of the subject and company&period;<&sol;li>&NewLine;<li>Phone numbers and email addresses used by the subject&period;<&sol;li>&NewLine;<li>Websites used by the subject company&period;<&sol;li>&NewLine;<li>Account names and numbers and financial institutions that received any funds &lpar;e&period;g&period;&comma; wire transfers&comma; prepaid card payments&rpar;&period;<&sol;li>&NewLine;<li>Description of interaction with the subject&period;<&sol;li>&NewLine;<&sol;ol>&NewLine;<p>Complainants are also encouraged to keep all original documentation&comma; emails&comma; faxes&comma; and logs of all communications&period;<&sol;p>&NewLine;<p>Because scams and fraudulent websites appear very quickly&comma; individuals are encouraged to report possible Internet scams and fraudulent websites by filing a complaint with the IC3 at <a href&equals;"https&colon;&sol;&sol;www&period;ic3&period;gov&sol;">www&period;ic3&period;gov<&sol;a>&period; To view previously released PSAs and Scam Alerts&comma; visit the IC3 Press Room at<a href&equals;"https&colon;&sol;&sol;www&period;ic3&period;gov&sol;media&sol;default&period;aspx">www&period;ic3&period;gov&sol;media&sol;default&period;aspx<&sol;a>&period;<&sol;p>&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;ic3&period;gov&sol;media&sol;2016&sol;160602&period;aspx">Original PressReleases &&num;8230&semi;<&sol;a><&sol;p>&NewLine;<h3>Examples of  TECH SUPPORT SCAM&colon;<&sol;h3>&NewLine;&Tab;<amp-carousel layout&equals;"responsive" type&equals;"slides" width&equals;"768" height&equals;"576" autoplay>&NewLine;&Tab;&Tab;<amp-img width&equals;"1024" height&equals;"577" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;TECH-SUPPORT-SCAM1024x577-1-1&period;png" class&equals;"attachment-full size-full" alt&equals;"TECH SUPPORT SCAM 1024x577" sizes&equals;"&lpar;max-width&colon; 1024px&rpar; 100vw&comma; 1024px"><&sol;amp-img><amp-img width&equals;"600" height&equals;"377" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;TECH-SUPPORT-SCAM-1-1&period;jpg" class&equals;"attachment-full size-full" alt&equals;"TECH SUPPORT SCAM" sizes&equals;"&lpar;max-width&colon; 600px&rpar; 100vw&comma; 600px"><&sol;amp-img><amp-img width&equals;"631" height&equals;"378" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;TECH-SUPPORT-SCAM-Virus-1-1&period;jpg" class&equals;"attachment-full size-full" alt&equals;"TECH SUPPORT SCAM-Virus" sizes&equals;"&lpar;max-width&colon; 631px&rpar; 100vw&comma; 631px"><&sol;amp-img><amp-img width&equals;"811" height&equals;"445" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;TECH-SUPPORT-SCAM-Mac-Defender-1-1&period;jpg" class&equals;"attachment-full size-full" alt&equals;"TECH SUPPORT SCAM-Mac-Defender" sizes&equals;"&lpar;max-width&colon; 811px&rpar; 100vw&comma; 811px"><&sol;amp-img><amp-img width&equals;"611" height&equals;"719" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;TECH-SUPPORT-SCAM-scamzapper-01-1-1&period;jpg" class&equals;"attachment-full size-full" alt&equals;"TECH SUPPORT SCAM scamzapper-01" sizes&equals;"&lpar;max-width&colon; 611px&rpar; 100vw&comma; 611px"><&sol;amp-img><amp-img width&equals;"900" height&equals;"506" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;TECH-SUPPORT-SCAM-norton&lowbar;scam-900x506-1-1&period;png" class&equals;"attachment-full size-full" alt&equals;"TECH SUPPORT SCAM norton&lowbar;scam-900x506" sizes&equals;"&lpar;max-width&colon; 900px&rpar; 100vw&comma; 900px"><&sol;amp-img><amp-img width&equals;"1185" height&equals;"632" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;TechSupportScam&lowbar;Avast-1-1&period;png" class&equals;"attachment-full size-full" alt&equals;"TechSupportScam&lowbar;Avast" sizes&equals;"&lpar;max-width&colon; 1185px&rpar; 100vw&comma; 1185px"><&sol;amp-img><amp-img width&equals;"718" height&equals;"499" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2016&sol;08&sol;TECH-SUPPORT-SCAM-2-1-1&period;jpg" class&equals;"attachment-full size-full" alt&equals;"TECH SUPPORT SCAM 2" sizes&equals;"&lpar;max-width&colon; 718px&rpar; 100vw&comma; 718px"><&sol;amp-img>&Tab;<&sol;amp-carousel>&NewLine;&NewLine;