📌 The 30-Second Version
Tech-support scams cost Americans $1.46 billion in 2024, making it the third-largest source of cybercrime losses after investment fraud ($6.57B) and Business Email Compromise ($2.77B), per the FBI's 2024 Internet Crime Report. The scams reach victims through full-screen browser pop-ups (Azure-blob-hosted "Windows Locked" screens), Geek Squad / Norton "auto-renewal" emails, and SEO-poisoned Google results that surface fake support numbers when victims search for help. Once on the phone, the scammer talks the victim into installing ConnectWise, AnyDesk, or Microsoft Quick Assist — all legitimate remote-administration tools, all weaponized for full computer takeover. Microsoft has taken down approximately 66,000 malicious domains since May 2024 and blocks 4,415 suspicious Quick Assist connections daily. The single defense: real Microsoft, Apple, Norton, and Geek Squad never display a phone number in a pop-up. Every pop-up phone number is a scam.
⚡ Quick Safety Rules
- Treat every pop-up phone number as a scam. Real Microsoft, Apple, Norton, and Geek Squad never put a phone number in a browser pop-up. Close the browser via Task Manager — do not call.
- Never install remote-access software (ConnectWise, AnyDesk, TeamViewer, Quick Assist) at the request of an inbound caller. Real Microsoft and Apple support do not call you.
- If you need tech support, type the company's name into your address bar, navigate from the home page to support, and use the contact methods listed there. Never call a number from a Google ad — search-result poisoning is one of the top intake channels.
- For Geek Squad / Norton / McAfee "auto-renewal" emails: do not call the number in the email. Log into your actual account from a clean browser and check your subscriptions. If the charge is real, your account will show it.
- If a scammer got remote access: disconnect from the internet, take the device to a reputable repair shop or do a full OS reinstall, change every password from a different device, enable 2FA on every account, and place a credit freeze with all three bureaus.
🪞 Is this tech-support situation a scam? — 30-second self-check
Run before calling any number, installing any software, or following any instructions from a "support" agent. Two or more "yes" answers and the answer is yes.
- Did a phone number appear inside a pop-up, full-screen browser warning, or unexpected email — even if it looks like Microsoft, Apple, Norton, or Geek Squad?
- Is anyone instructing you to install ConnectWise, AnyDesk, TeamViewer, or to open Microsoft Quick Assist?
- Are you being asked to log into your bank account "to confirm a refund" while the agent watches your screen?
- Is the script urgent — telling you not to shut down the computer, not to hang up, not to talk to anyone else, or that hackers are watching you right now?
2+ yes: Stop. Disconnect the device from the internet. Call a trusted family member or a reputable local repair shop. → Skip to What to Do
Jump to a Variant
The Anatomy of a Two-Day Microsoft Support Scam
The post is on r/techsupport, headlined "My friend/neighbor fell for the Microsoft Support scam." The author's neighbor — a senior, described as smart and ordinarily skeptical — got a full-screen pop-up saying her computer was locked and a phone number to call. She called it. She granted the man on the phone full remote access to her computer. He told her not to use her cell phone because he had "put it on an encrypted line" and she could only use it when he told her she could. She watched, on her own screen, as scripts ran for two days.
On day two, he told her she had "TINBA" — a real banking trojan, name dropped to sound legitimate — and asked for the toll-free number to her bank. She gave it. He said he was going to call the bank and add her to a three-way conversation. He did. The "bank guy" asked her to log into her bank account to verify nothing was wrong. She did. The "bank guy" told her he was placing her account on high alert and she should not use it — no debit, no bill pay, no credit card — until Monday.
The author wrote: "I had tried to warn her the first day but she got very belligerent with me so I backed off. I don't even know why I'm writing all this. I guess I'm hoping there is a slight chance this wasn't a scam???" The top community reply was direct: "100% scam. Microsoft support contacting bank? I feel sorry for her, but you have tried your best, no fault of your own." Another commenter, with 46 upvotes: "The entire computer needs to be wiped. I had the same one last week and you never know where that remote software put trackers or keyloggers." [r/techsupport · 127 upvotes as of Apr 2026]
What These Scams Actually Are
Tech-support scams are a category of social engineering that begins with a fraudulent pop-up, a system warning, an "auto-renewal" email, or a poisoned Google search result, and ends with the scammer in remote control of the victim's computer or in possession of the victim's bank credentials. The FBI's 2024 Internet Crime Report ranks tech-support fraud as the "third-largest source of fraud losses after investment fraud ($6.57 billion) and Business Email Compromise scams ($2.77 billion)" — at $1.46 billion. Combined call-center scams (tech support plus cryptocurrency-exchange impersonation) reached $1.9 billion in 2024.
Mechanically, the scripts share four phases:
- Trigger. A full-screen browser pop-up announcing "Windows Locked due to unusual activity," an email about a $300+ Geek Squad / Norton auto-renewal you don't remember, a Google search result that surfaces a fake "Microsoft support" number paid into the top of search, or — less commonly now — an outbound robocall.
- Authority + urgency. The caller cites Microsoft / Apple / Norton brand authority. The script names a specific malware family ("TINBA," "Pegasus," "Zeus banking trojan") to sound technical. The victim is told not to shut down the computer, not to hang up, not to talk to anyone else — language designed to short-circuit the impulse to verify.
- Remote access. The caller walks the victim through installing ConnectWise ScreenConnect, AnyDesk, TeamViewer, or — increasingly — using Microsoft Quick Assist. All four are legitimate IT-administration tools, which is exactly what makes them effective in this context. Once installed, the scammer sees the victim's screen and can move the mouse on the victim's behalf.
- Extraction. Bank-account drain via the victim's own browser, fake refund "overpayment" walk-through that demands gift cards / wire / cryptocurrency to make whole, sale of fake antivirus or "lifetime support" subscriptions, or covert installation of additional malware (keyloggers, info-stealers) for later use.
Microsoft's Digital Crimes Unit reported in June 2025 that since May 2024 it had "proactively take down approximately 66,000 malicious domains and URLs globally related to tech support scams," and that it now blocks "an average of 4,415 suspicious Quick Assist connections each day, accounting for about 5.46% of all connection attempts." The cybercriminal group Microsoft tracks as Storm-1811 specializes in this — Microsoft's blog notes "Storm-1811, a cybercriminal group abusing Windows Quick Assist to impersonate IT support, primarily using voice phishing (vishing) rather than AI to manipulate victims into granting remote access."
The enforcement side has begun to bite. The FBI's 2024 IC3 report notes "more than 215 arrests were made through 11 joint operations between the FBI, India's Central Bureau of Investigation, and other local law enforcement agencies — a 700% increase from the previous year." Most tech-support call-center operations run from India; the joint U.S.-India enforcement push is the structural intervention that scaled in 2024.
🔑 The single rule that defeats every variant — pop-up phone numbers are always fake
Real Microsoft, Apple, Norton, and Geek Squad never put a phone number in a browser pop-up. Microsoft's official statement is unambiguous: "Microsoft does not send unsolicited email messages or make unsolicited phone calls to request personal or financial information, or to provide technical support to fix your computer."
If you need tech support, type the company's name into your address bar, navigate from the home page to the support section, and use the contact methods listed there. Never call a number from a pop-up. Never call a number from an unsolicited email. Never call a number from a Google ad — search-result poisoning is now one of the top intake channels for tech-support scams. The r/techsupport community advice on the canonical case is direct: do not engage. Close the browser via Task Manager; do not call.
The intake channel varies. The script that follows it does not — every mask below funnels into the same remote-access endgame.
The 5 Variants
A web page hijacks the victim's browser into full-screen mode, displays a fake "Windows locked due to unusual activity" warning with a phone number and Microsoft branding, and locks the victim out of normal navigation. The page is hosted on a legitimate Azure Blob Storage subdomain (or similar trusted host) to bypass URL-based detection. The phone number connects to a scam call center.
The r/Scams thread "Fake 'Windows locked due to unusual activity' full-screen scam" (117 upvotes) describes the textbook version. The author's screen suddenly switched to a full-screen "Windows Advanced options / Admin login" page that claimed: "Windows locked due to unusual activity. Asked for my Microsoft ID and password. Told me to call 'Windows Technical Support' at +1-888-977-1274 (toll-free). Warned not to shut down or restart the PC." The page was hosted on an Azure Blob Storage subdomain — a real Microsoft cloud service being abused to host the scam content, which made the URL look more legitimate to anyone who checked it. The author did not call. They closed the browser via Task Manager and ran a malware scan.
The community top reply (25 upvotes): "Open Task manager (Ctrl-Alt-Del) and end the Task. Check in Startup if something funny is listed. Do full malware scan." A second commenter noted: "They don't care. This has been around for more than a year now" — a reference to the slow pace at which Microsoft Azure responds to abuse reports for blob-storage-hosted scam pages. The scam is sticky precisely because the hosting infrastructure is legitimate; takedowns require Microsoft's abuse process, which can take days while the scam page continues to serve.
Kill the browser via Task Manager — never via the page's own buttons. The full-screen lockup is not a real Windows lock. The browser is being held in full-screen mode by a JavaScript trick; ending the browser process ends the page. On Windows: Ctrl+Alt+Delete → Task Manager → end the browser. On Mac: Command+Option+Esc → Force Quit. Then run a malware scan, in case the redirect installed any additional payload. Microsoft's Digital Crimes Unit takes down roughly 66,000 of these pages per year — and that's only the share it catches before the next batch spins up on the same Azure subdomain pool an hour later. The user-side defense is the only one that scales.
Red Flags
- Browser switches to full-screen mode unexpectedly, often after clicking an ad or visiting a low-reputation site
- Page displays a phone number with an "official" looking Microsoft, Windows Defender, or Apple logo
- Audio loop or robotic voice repeats "your computer has been locked, do not shut down, call immediately"
- URL bar (if visible) shows an Azure Blob Storage, Cloudflare Pages, or other legitimate-cloud-host subdomain — the scam page is hosted on a trusted service to evade URL filters
- Page warns specifically not to shut down, restart, or close the browser — language designed to keep you on the page until you call
How to Avoid
- Do not call the number. Real Microsoft and Apple do not put phone numbers in browser pop-ups. Period.
- Force-quit the browser via Task Manager (Ctrl+Alt+Del → Task Manager on Windows; Command+Option+Esc → Force Quit on Mac). Do not click the page's "X" or "OK" buttons — they may trigger additional pop-ups.
- When the browser reopens, do not "restore previous session" — that brings the malicious page back. Open a fresh blank window.
- Run a reputable antivirus scan (Windows Defender is sufficient for most cases; Malwarebytes is a good second-opinion scanner).
- Report the URL to Microsoft (microsoft.com/reportascam) and to the hosting provider's abuse address. The Microsoft Digital Crimes Unit took down approximately 66,000 of these domains since May 2024 — your report contributes.
The full-screen lockup is the most visible variant because it is loud — full-screen mode, audio loop, urgent text. The next variant is quieter and arrives in your inbox.
An "auto-renewal" email lands in your inbox claiming a $300+ subscription has been renewed. You call the number to dispute. The scammer claims they will refund the charge and asks you to log into your bank to confirm receipt. They take remote control of your screen, manipulate the visible balance to make it appear the bank refunded too much, and demand the "overage" returned in gift cards or wire. Geek Squad was the most-impersonated company in FTC 2023 fraud data, with around 52,000 scam reports.
The FTC's consumer alert on the Geek Squad renewal scam describes the mechanic with unusual specificity: "Scammers take you to a spoofed website that looks real and tell you to enter your bank or credit card information to process the refund. After you do that, they claim there was an error in the amount entered and say they refunded you too much money, insisting you pay them back with gift cards, a wire transfer, a bank transfer, cryptocurrency, or a payment app." The "overage" is the entire scam. The scammer never actually refunded anything; they manipulated the on-screen view to make it look like a refund happened, often by overlaying the browser with their own fake banking interface or by editing the visible HTML of the bank page through their remote-access session.
The scale is large. Geek Squad has been the most-impersonated brand in FTC consumer fraud reports for multiple years running, with approximately 52,000 reports in 2023 alone. Norton, McAfee, Best Buy direct, and PayPal-themed renewal emails follow the same pattern. The emails are convincing: real Best Buy logos, real Geek Squad branding, plausible invoice numbers, real-looking subscription details. Older adults are the primary target — the FTC's October 2024 report found "consumers 60 and older were five times more likely to be victims of a tech support scam than people ages 18-59," with older consumers reporting "$175 million in losses to tech support scams in 2024."
So what stops it? Open a clean browser — not any link in the email — type the company's URL yourself (bestbuy.com, norton.com, mcafee.com, amazon.com, paypal.com), and check your subscriptions there. If the charge is real, your real account will show it. If it isn't there, the email is fake. Delete it, report it to the FTC at reportfraud.ftc.gov and to the impersonated company directly. Best Buy's own published guidance is identical: real Geek Squad renewal emails do not include a phone number. The presence of a phone number in a renewal email is itself the diagnostic.
Red Flags
- Email about a $300–$500 subscription auto-renewal you do not remember signing up for
- Phone number prominently displayed for "disputing" the charge — real renewal notices link to your account, not a phone number
- Sender domain looks slightly off (geek-squad-billing.com, norton-renewal.com) rather than the real corporate domain
- Urgency: "you have 24 hours to dispute," "click here to cancel before the renewal posts"
- The amount is just high enough to provoke action ($300+) but just plausible enough for a real software subscription
How to Avoid
- Never call a phone number from an email. Real subscription renewals do not include phone numbers — they link you to your account.
- Log into your actual Best Buy / Norton / McAfee account from a clean browser (type the URL yourself, do not click email links). Check your subscriptions there.
- If the charge does not appear in your real account, the email is a scam. Delete it. Report to reportfraud.ftc.gov.
- If you already called the scam number but did not give them remote access or banking info, no harm done. Block the number, ignore further calls, and watch your bank statement for 30 days.
- If you gave them your bank-account login or let them remote into your computer, see What to Do below — assume full compromise and act immediately.
The Geek Squad email scam pulls victims toward the scammer. The next variant flips the direction — the victim seeks out the scammer's number themselves, because Google surfaces it.
Victim has a legitimate tech problem and self-googles for help. The top result is a paid ad or SEO-poisoned page surfacing a fake "Microsoft support" number. The victim calls the number themselves — no inbound call, no pop-up, no email — which makes the engagement feel verified. The scammer then walks them through installing ConnectWise or AnyDesk for "diagnosis," and the rest of the script unfolds.
The r/Scams thread "ConnectWise scam for Microsoft Tech Support" (4 upvotes, but a high-quality victim post) describes the textbook self-googled version. The author was logged out of their Outlook account for too many failed attempts. They "researched online google a number to call Microsoft for help," called the number, and were told they had a "security breach." The scammer instructed them to download ConnectWise on their iPhone. The phone call lasted 34 minutes. The scammer asked the victim to access their bank accounts to check whether someone had been "successfully buying crypto" with their cards. The victim caught it — they noticed they were screen-sharing — and disconnected. They wrote, with the panic of someone who has just realized they were almost robbed: "How much do they have? How fast can they steal everything from me?"
"How much do they have? How fast can they steal everything from me?" — that single line, written by a victim mid-panic, is the moment every SEO-poisoned-search story arrives at if it doesn't get caught earlier. The fix is upstream of the search itself. Type the company's URL into your address bar (microsoft.com, apple.com, google.com), navigate from the home page to the support section, and use the contact methods listed there. Microsoft, Apple, Google, and Outlook all run official support pages with documented contact paths. The fact that a phone number appears at the top of Google does not mean Google has verified it — paid scam ads routinely outrank the legitimate company's own support page, and r/Scams' automod responses for `!techsupport`, `!refund`, and `!recovery` exist because the pattern is that common.
The reason this variant is so effective is the verification flip. In every other variant, the scammer initiates contact and the victim suspects "I didn't ask for this — why is it happening?" In the SEO-poisoned-search variant, the victim initiated contact themselves. They Googled it. They dialed the number. They believe they are the one driving the conversation. That self-initiated framing collapses the suspicion that protects victims in the inbound-call variants. Self-googled numbers are one of the most dangerous tech-support scam channels precisely because they feel safe.
Red Flags
- You Googled the support number rather than typing the company URL and finding it on their website
- The top Google result is an ad, often with "Sponsored" or "Ad" labeling
- The phone number is in an organic search result on a generic-looking site (techhelp24.com, supportexpert.io) that is not the actual company's domain
- The agent immediately wants remote access to your computer or phone "to diagnose"
- The agent claims a security breach you did not contact them about — they pivot from your stated problem to a more urgent fictional one
How to Avoid
- Type the company's URL into your address bar (microsoft.com, apple.com, google.com). Navigate from the home page to support. Use the contact methods listed there.
- Do not call phone numbers from Google ads or search results, even if they look like the real company. Search-result poisoning is the dominant intake channel for tech-support scams.
- For Microsoft support, the official entry point is support.microsoft.com (chat-based for most issues). For Apple, support.apple.com. For Outlook, log into outlook.com and use the in-product help.
- If you've already called a Google-result number but have not granted access or shared anything sensitive: hang up, do not call back, ignore any callbacks, and verify the real support contact via the company's website.
- If you've already granted remote access or shared bank info: see What to Do — assume full compromise.
The first three variants get the victim into the call. The fourth is what happens once they're on it.
After the intake call begins, the scammer walks the victim through installing or opening a remote-access tool: ConnectWise ScreenConnect on Windows or iPhone, AnyDesk, TeamViewer, or Microsoft Quick Assist (built into Windows). Once installed, the scammer can see the victim's screen and move the mouse on the victim's behalf. They typically use this access to drain bank accounts, install additional malware, or stage the fake-refund overpayment trick.
The r/techsupport thread "Friend temporarily fell for a tech support scam" (114 upvotes) captures the standard mechanic. The friend got a "computer locked" pop-up, called a Microsoft-branded support number, and let the scammer remote into his laptop. The scammer took him to the registry editor where it shows real-but-confusing system entries and tried to sell him an antivirus. He hung up, turned off Wi-Fi, and turned the laptop off. The author asked: "if he watched the guy remotely access his computer the whole time and the scammer never tried opening up any documents or anything, how likely is it that any files or personal information were taken?"
The top community reply (90 upvotes) is the canonical answer: "An attacker had full remote access to your friend's PC. They could have done anything. You will not know exactly what they did. The safest course of action is to assume the whole PC is compromised. Any sensitive data, passwords, cookies for logged in websites etc, are potentially exposed to the scammers. Possibly the PC is infected with malware. The correct response in that case is to format the PC and do a clean Os install. Change passwords on all online accounts and configure MFA." A second commenter, 34 upvotes: "If he saw someone access the pc. Fully format it. Reset all passwords for everything. I would only need seconds to take whatever I need or plant whatever I want without the person knowing once I gained access."
Microsoft Quick Assist deserves separate attention. Microsoft tracks the cybercriminal group behind much of the Quick Assist abuse as Storm-1811. Per Microsoft's June 2025 blog: "In April 2024, Microsoft Threat Intelligence observations highlighted Storm-1811, a cybercriminal group abusing Windows Quick Assist to impersonate IT support, primarily using voice phishing (vishing) rather than AI to manipulate victims into granting remote access." Microsoft now blocks "an average of 4,415 suspicious Quick Assist connections each day, accounting for about 5.46% of all connection attempts" — meaning roughly one in twenty Quick Assist sessions Microsoft sees is flagged as potentially malicious. Microsoft has built warning prompts into Quick Assist and is rolling out further detection, but the tool's legitimate use case (remote IT help for grandparents, etc.) means it cannot simply be disabled.
The friend who turned off Wi-Fi in the r/techsupport thread didn't avoid the worst because he was lucky — he avoided it because he stopped engaging within minutes. What he didn't avoid was the days of cleanup: the format, the OS reinstall, the password resets, the credit-freeze paperwork, the unanswered question of what exactly did they look at. That residue is the real cost of a remote-access scam, and the only way to skip it is to never grant access. Never install ConnectWise, AnyDesk, TeamViewer, or open Microsoft Quick Assist at the request of an inbound caller. Real Microsoft support — the kind you reach by typing microsoft.com yourself — does not require remote-access tools to resolve most issues, and never asks you to install one without you having proactively scheduled the appointment from your account. The tools themselves are legitimate. The request to install one at an inbound caller's direction is the diagnostic.
Red Flags
- Inbound caller asks you to install ConnectWise, AnyDesk, TeamViewer, LogMeIn, or to open Microsoft Quick Assist
- Caller provides a "support code" or "session ID" to enter into the tool
- Caller takes you to the Windows Event Viewer or Registry Editor and shows you "errors" — these are normal system entries that look alarming to someone unfamiliar with Windows internals
- Caller offers an "antivirus" or "lifetime support package" for $200–$500 after "diagnosing" your problem
- Caller insists you stay on the line, do not hang up, do not turn off the computer, do not talk to anyone else
How to Avoid
- Never install remote-access software at the request of an inbound caller. If the request is to install it, the call is a scam.
- If you are using Quick Assist for legitimate purposes (a family member helping you), verify the request via a different channel — a separate phone call, a text — before sharing the security code.
- Microsoft Quick Assist now displays warning prompts for high-risk sessions. Read them carefully. If the prompt warns about granting full control, end the session.
- If a caller has already taken you to the Event Viewer or Registry and shown you "errors," that itself is a strong signal — the contents of those tools look alarming but are routine system logs. Real support does not use Event Viewer to scare customers.
- If you have already granted remote access, see What to Do below. The Reddit consensus is unambiguous: full OS reinstall, every password reset from a different device, 2FA on every account, credit freeze.
Remote access is the platform. The fifth variant is the most common monetization route once that platform is in place.
Once remote access is established, the scammer asks the victim to log into their bank account "to confirm a refund" or "to check for fraudulent activity." The victim enters credentials. The scammer then either (a) initiates Zelle/wire transfers from the victim's account directly while the victim watches, (b) uses the fake-refund "overpayment" mechanic to convince the victim they have been overpaid and demands repayment via gift cards, or (c) silently extracts saved passwords, browser cookies, and stored financial info for later use.
The clearest first-person account of this variant lives on r/Scams under the title "Microsoft Security Scam. What do I do now?" The author had just bought a new laptop. They pulled up Facebook for the first time, clicked a friend request, and a Microsoft Security Team pop-up appeared with a phone call coming through almost simultaneously. They called. They granted remote access. The agent ran what looked like diagnostic reports, then said the victim's IP address had been compromised and their phone was being listened to. He asked yes/no questions: "Do you use online banking? Do you pay your bills online?" Each answer narrowed the script toward the bank-drain phase.
The pivot came when the agent told the author her phone was compromised and she needed to call "another secure number." She did. The second agent began downloading a program that was visibly not from Microsoft — the install prompt was the moment her suspicion broke through. She questioned him. He told her if she wouldn't continue he would hang up and she could "find her own computer repair person." The threat-to-leave is part of the script. It weaponizes the victim's sunk cost — the 30 minutes already spent, the embarrassment of admitting suspicion. She hung up. She got out before the bank-drain phase started. Most of the people who reach this point in the script do not.
If the script has reached your bank-account login, what's left is damage-control. Disconnect the device from the internet immediately. Call your bank's fraud line on the number printed on the back of your debit card — never a number the agent provided. Place a fraud hold on every account. Change every banking password from a different, uncompromised device. Watch statements daily for 90+ days. Place a credit freeze with all three bureaus. The FBI's IC3 reports note that older Americans alone reported nearly $4.9 billion stolen through fraud in 2024, a 43% year-over-year increase, with tech-support and call-center fraud as the dominant categories driving that climb. Speed matters more than completeness — a fraud hold placed in the first ten minutes recovers more than a perfectly documented one placed in the first hour.
Red Flags
- Agent asks you to log into your bank account "to verify a refund," "to check for unauthorized charges," or "to make sure your account is safe"
- Agent asks for your bank's customer-service phone number — they want to set up a three-way call with a fake "bank fraud officer"
- Agent asks you to do nothing with your bank account for a period (don't use debit, don't pay bills, don't check the balance) — they want time to drain it without you noticing
- Agent's screen shows a "refund amount" different from what you expected, and they claim the bank has refunded too much — the gift-card overpayment trick
- Agent asks you to send "verification" payments via Zelle, gift cards, wire, or cryptocurrency before any "real" support can be performed
How to Avoid
- Never log into your bank account during a tech-support call. There is no legitimate reason a Microsoft / Apple / Norton support agent needs to see your bank account.
- If the agent claims a "refund" requires bank login, hang up. Real refunds go to the original payment method automatically — they do not require the agent to watch you log in.
- If the agent sets up a "three-way call with your bank," hang up. Real bank fraud teams do not coordinate with third-party tech-support agents on calls you didn't initiate.
- If you have already logged into your bank with a remote agent watching, see What to Do immediately. Time is the variable that determines loss size.
- For elderly relatives at higher risk, set up bank alerts that notify a trusted family member of any transaction over a low threshold (say, $200) — a structural early-warning system that does not depend on the relative recognizing the scam.
The Numbers (and Where They Come From)
Every figure below is from a primary source with the verbatim quote on file in our research log.
One additional fact worth knowing: tech-support fraud was the most frequently reported crime type by Americans over 60 in 2023, with nearly "$590 million in losses" that year alone (FBI via Microsoft DCU). Older Americans reported nearly "$4.9 billion stolen through fraud last year, with an average loss of $83,000. That's a stunning 43 percent more than last year" per the FBI's 2024 report. AARP research finds nearly "2 in 3 victims suffer a significant health or emotional impact" from these scams — the financial loss is one part; the cognitive and emotional toll is the other.
Recovery Reality (and Why Full Reformat Is the Right Answer)
Recovery from a tech-support scam splits into two parallel tracks: the financial side (getting money back) and the device side (cleaning up the compromised computer or phone). Neither is fast.
On the financial side, recovery rates are low. If the loss came through gift cards, recovery is essentially zero — gift-card balances are typically extracted within minutes of the codes being shared. If the loss came through wire transfer, the FBI's Recovery Asset Team (FBI-RAT) can sometimes claw back funds if reported within hours, but the success rate drops sharply after 24 hours. If the loss came through Zelle or another P2P app, see our Bank-Impersonation & Zelle Scams page — banks reimbursed only 12% of disputed Zelle scam claims in 2023 per the Senate Permanent Subcommittee on Investigations. Credit-card chargebacks have the highest recovery rate but require disputing within 60 days. File at ic3.gov within 24 hours regardless — the IC3 reports drove the 215+ arrests in 2024.
On the device side, the Reddit and r/techsupport consensus is uniform: "format the PC and do a clean OS install." Antivirus scans alone are insufficient because a scammer with full remote-access privileges may have installed payloads (rootkits, custom keyloggers, persistence mechanisms) that are not in any antivirus signature database. The conservative response is: disconnect the device from the internet, take it to a reputable repair shop, request a clean OS reinstall (not a "factory reset" — those preserve some data partitions), change every password from a different, uncompromised device, enable two-factor authentication on every account, and place a credit freeze with all three credit bureaus. Watch bank and credit-card statements daily for at least 90 days.
Identity recovery is the long tail. If the scammer exfiltrated tax documents (a common target — tax docs contain SSN, prior addresses, employer information), monitor for tax-return identity theft when filing season comes around. The IRS's Identity Theft Central tracks the recovery process. Consider filing a Form 14039 Identity Theft Affidavit preemptively if you have evidence of tax-document exfiltration. The blunt summary: assume the scammer has anything that was on the device, and act accordingly.
🆘 What to Do If You Engaged with a Tech-Support Scammer
📵 Disconnect the Device — Now
Unplug the Ethernet cable, turn off Wi-Fi, or power down the device entirely. While the device is online, the scammer may still have access. While it is offline, they cannot exfiltrate further data or initiate further transactions.
📞 Bank Fraud Line — From a Different Device
Call the number on the back of your debit card from a phone that the scammer has not had access to. Place a fraud hold on every account. If you used the compromised device to log into a bank, treat that account as compromised regardless of what the scammer appeared to do.
🔄 Full OS Reinstall (or Repair Shop)
Take the compromised device to a reputable local repair shop. Tell them remote-access tools were installed and you need a clean OS reinstall — not a "factory reset." Antivirus scans alone are not sufficient when the attacker had full administrator privileges.
🔑 Reset Every Password — From Another Device
Use a different, uncompromised device to reset every password (email, banking, social media, work accounts). Enable two-factor authentication on every account that supports it. Prioritize email first — email controls password resets for every other account.
🏛 FBI IC3 + FTC + Microsoft
File at ic3.gov (drives FBI–India joint operations), at reportfraud.ftc.gov (drives FTC enforcement priorities), and at microsoft.com/reportascam (drives Microsoft DCU domain takedowns). Reporting builds the cases.
🛡 Credit Freeze (3 Bureaus)
Place a credit freeze with Experian, Equifax, and TransUnion. Freezes are free, take about 5 minutes per bureau, and prevent any new credit account from being opened in your name. The scammer may have exfiltrated SSN-equivalent data; a freeze is the structural defense.
If You're Reporting Outside the United States
Tech-support scams are global. The Microsoft / Apple / Norton brand impersonation works in any country where those brands are used; the call-center infrastructure (largely in India) services victims worldwide. Reporting paths:
- United Kingdom: Action Fraud for the police-side report; NCSC for malicious-URL reports. UK Trading Standards handles the consumer-protection side.
- Canada: Canadian Anti-Fraud Centre (CAFC) and the RCMP. CAFC tracks tech-support fraud as one of its top reported categories annually.
- Australia: Scamwatch (run by the ACCC). Tech-support scams are documented separately in Scamwatch's annual Targeting Scams report.
- European Union: Report to your national fraud office (e.g., Germany's BSI, France's Cybermalveillance.gouv.fr) and to Europol's online crime portal.
- India: India's National Cyber Crime Reporting Portal for victims of call centers operating from within India. The Central Bureau of Investigation (CBI) has been the U.S. FBI's joint-operations partner on the 215+ tech-support arrests in 2024.
Frequently Asked Questions
📚 Source Threads (Reddit, 2024–2026)
The two-day neighbor case
"My friend/neighbor fell for the Microsoft Support scam" — r/techsupport, 127 upvotes (as of Apr 2026). The canonical full-script case: pop-up → call → remote access → fake bank three-way → two-day extraction.
The Azure-blob fake lockup
"Fake 'Windows locked due to unusual activity' full-screen scam" — r/Scams, 117 upvotes. Documents the Azure Blob Storage hosting trick that lets scam pages bypass URL filters.
The remote-access damage assessment
"Friend temporarily fell for a tech support scam, had someone remotely access his laptop" — r/techsupport, 114 upvotes. Top reply (90 upvotes) is the canonical "format the PC, change every password" answer.
The new-laptop FB-popup variant
"Microsoft Security Scam. What do I do now?" — r/Scams, 10 upvotes. First-person victim view of the bank-drain attempt; victim disconnected in time.
The self-googled ConnectWise variant
"ConnectWise scam for Microsoft Tech Support" — r/Scams, 4 upvotes. Documents the SEO-poisoned-search intake — victim Googled the support number themselves.
The Microsoft DCU public report
"Microsoft dismantles transnational scam infrastructure" — Microsoft on the Issues blog, June 2025. Source for the 66,000 domain takedowns, Storm-1811 attribution, and the 4,415 Quick Assist daily blocks.
Related Reading
Tech-support scams overlap with several other scam mechanisms documented on tabiji. Internal: the Everywhere hub; Bank-Impersonation & Zelle Scams (the bank-drain monetization phase often uses Zelle as the rail); AI Voice-Clone Scams (an emerging adjacent category — cloned IT-support voices targeting corporate help desks for MFA reset); Pig-Butchering Scams (different intake but similar bank-drain mechanics in the extraction phase). External authorities: the FBI IC3 2024 Annual Report; the Microsoft DCU June 2025 blog on the Storm-1811 disruption; the FTC consumer alert on the fake Geek Squad renewal; the AARP tech-support-scam research summary.
A field-guide to the scams happening everywhere — phone, text, online, in person.
tabiji's tourist-scam atlases cover 17 countries. The next book is different — it covers the scams that don't care where you live: tech-support pop-ups, bank-impersonation Zelle scams, real-estate wire fraud, AI voice clones, pig-butchering, fake job offers, and dozens more. Same research method (FBI / FTC / Microsoft / CFPB sources cross-referenced with thousands of Reddit victim threads). Same $4.99 Kindle price.
- 30+ scams documented across phone, text, online, and in-person channels
- The script, the red flags, and the exit lines that end each conversation
- Family-intervention scripts for elderly relatives in active scams
- U.S. and international reporting paths (IC3, FTC, CFPB, Action Fraud, CAFC, Scamwatch)
This page is consumer education, not legal or financial advice. The scams documented here are real and the defenses are drawn from patterns across 4,045+ Reddit posts and comments (276 threads, 3,769 comments) plus the federal-agency, NGO, and industry sources cited inline, but every situation is different. If you have lost money to a tech-support scam, consult a licensed attorney through your state bar's referral service before paying anyone for "recovery" services — recovery scams (the meta-scam that targets victims of tech-support scams) are a documented and distinct fraud category. Reddit thread upvote counts are reported as of April 2026 and may have changed since publication. Last updated: April 29, 2026. Next scheduled refresh: July 29, 2026.