💻 Scam Guide · 2026 · Everywhere

Tech-Support Scams: 5 Variants and the Single Rule That Defeats Them All

$1.46B lost to tech-support scams in 2024 — the third-largest cybercrime category after investment fraud and BEC (FBI IC3). 60+ are 5x more likely to be victims (FTC). 5 documented variants, real Reddit victim stories, and the rule no scammer can route around.

💬 Channels: Browser pop-up · Email · Phone 📅 Updated April 2026 📑 5 variants documented ⭐ Reddit-sourced & FBI/FTC/Microsoft-verified
🎯 Target: 60+ adults · 5x more likely (FTC) 📈 Older losses 2024: $175M (FTC) 📉 Median loss range: $10K–$50K
📖 14 min read

📌 The 30-Second Version

Tech-support scams cost Americans $1.46 billion in 2024, making it the third-largest source of cybercrime losses after investment fraud ($6.57B) and Business Email Compromise ($2.77B), per the FBI's 2024 Internet Crime Report. The scams reach victims through full-screen browser pop-ups (Azure-blob-hosted "Windows Locked" screens), Geek Squad / Norton "auto-renewal" emails, and SEO-poisoned Google results that surface fake support numbers when victims search for help. Once on the phone, the scammer talks the victim into installing ConnectWise, AnyDesk, or Microsoft Quick Assist — all legitimate remote-administration tools, all weaponized for full computer takeover. Microsoft has taken down approximately 66,000 malicious domains since May 2024 and blocks 4,415 suspicious Quick Assist connections daily. The single defense: real Microsoft, Apple, Norton, and Geek Squad never display a phone number in a pop-up. Every pop-up phone number is a scam.

⚡ Quick Safety Rules

🪞 Is this tech-support situation a scam? — 30-second self-check

Run before calling any number, installing any software, or following any instructions from a "support" agent. Two or more "yes" answers and the answer is yes.

  1. Did a phone number appear inside a pop-up, full-screen browser warning, or unexpected email — even if it looks like Microsoft, Apple, Norton, or Geek Squad?
  2. Is anyone instructing you to install ConnectWise, AnyDesk, TeamViewer, or to open Microsoft Quick Assist?
  3. Are you being asked to log into your bank account "to confirm a refund" while the agent watches your screen?
  4. Is the script urgent — telling you not to shut down the computer, not to hang up, not to talk to anyone else, or that hackers are watching you right now?

2+ yes: Stop. Disconnect the device from the internet. Call a trusted family member or a reputable local repair shop. → Skip to What to Do

Jump to a Variant

  1. High Full-Screen Browser-Pop-up Lockup ("Windows Locked")
  2. High Geek Squad / Norton "Auto-Renewal" Email Refund Trap
  3. High SEO-Poisoned "Microsoft Support" Google Number
  4. High Remote-Access Installation (ConnectWise / AnyDesk / Quick Assist)
  5. High Bank-Drain via Remote-Controlled Browser

The Anatomy of a Two-Day Microsoft Support Scam

The post is on r/techsupport, headlined "My friend/neighbor fell for the Microsoft Support scam." The author's neighbor — a senior, described as smart and ordinarily skeptical — got a full-screen pop-up saying her computer was locked and a phone number to call. She called it. She granted the man on the phone full remote access to her computer. He told her not to use her cell phone because he had "put it on an encrypted line" and she could only use it when he told her she could. She watched, on her own screen, as scripts ran for two days.

On day two, he told her she had "TINBA" — a real banking trojan, name dropped to sound legitimate — and asked for the toll-free number to her bank. She gave it. He said he was going to call the bank and add her to a three-way conversation. He did. The "bank guy" asked her to log into her bank account to verify nothing was wrong. She did. The "bank guy" told her he was placing her account on high alert and she should not use it — no debit, no bill pay, no credit card — until Monday.

The author wrote: "I had tried to warn her the first day but she got very belligerent with me so I backed off. I don't even know why I'm writing all this. I guess I'm hoping there is a slight chance this wasn't a scam???" The top community reply was direct: "100% scam. Microsoft support contacting bank? I feel sorry for her, but you have tried your best, no fault of your own." Another commenter, with 46 upvotes: "The entire computer needs to be wiped. I had the same one last week and you never know where that remote software put trackers or keyloggers." [r/techsupport · 127 upvotes as of Apr 2026]

What These Scams Actually Are

Tech-support scams are a category of social engineering that begins with a fraudulent pop-up, a system warning, an "auto-renewal" email, or a poisoned Google search result, and ends with the scammer in remote control of the victim's computer or in possession of the victim's bank credentials. The FBI's 2024 Internet Crime Report ranks tech-support fraud as the "third-largest source of fraud losses after investment fraud ($6.57 billion) and Business Email Compromise scams ($2.77 billion)" — at $1.46 billion. Combined call-center scams (tech support plus cryptocurrency-exchange impersonation) reached $1.9 billion in 2024.

Mechanically, the scripts share four phases:

  1. Trigger. A full-screen browser pop-up announcing "Windows Locked due to unusual activity," an email about a $300+ Geek Squad / Norton auto-renewal you don't remember, a Google search result that surfaces a fake "Microsoft support" number paid into the top of search, or — less commonly now — an outbound robocall.
  2. Authority + urgency. The caller cites Microsoft / Apple / Norton brand authority. The script names a specific malware family ("TINBA," "Pegasus," "Zeus banking trojan") to sound technical. The victim is told not to shut down the computer, not to hang up, not to talk to anyone else — language designed to short-circuit the impulse to verify.
  3. Remote access. The caller walks the victim through installing ConnectWise ScreenConnect, AnyDesk, TeamViewer, or — increasingly — using Microsoft Quick Assist. All four are legitimate IT-administration tools, which is exactly what makes them effective in this context. Once installed, the scammer sees the victim's screen and can move the mouse on the victim's behalf.
  4. Extraction. Bank-account drain via the victim's own browser, fake refund "overpayment" walk-through that demands gift cards / wire / cryptocurrency to make whole, sale of fake antivirus or "lifetime support" subscriptions, or covert installation of additional malware (keyloggers, info-stealers) for later use.

Microsoft's Digital Crimes Unit reported in June 2025 that since May 2024 it had "proactively take down approximately 66,000 malicious domains and URLs globally related to tech support scams," and that it now blocks "an average of 4,415 suspicious Quick Assist connections each day, accounting for about 5.46% of all connection attempts." The cybercriminal group Microsoft tracks as Storm-1811 specializes in this — Microsoft's blog notes "Storm-1811, a cybercriminal group abusing Windows Quick Assist to impersonate IT support, primarily using voice phishing (vishing) rather than AI to manipulate victims into granting remote access."

The enforcement side has begun to bite. The FBI's 2024 IC3 report notes "more than 215 arrests were made through 11 joint operations between the FBI, India's Central Bureau of Investigation, and other local law enforcement agencies — a 700% increase from the previous year." Most tech-support call-center operations run from India; the joint U.S.-India enforcement push is the structural intervention that scaled in 2024.

🔑 The single rule that defeats every variant — pop-up phone numbers are always fake

Real Microsoft, Apple, Norton, and Geek Squad never put a phone number in a browser pop-up. Microsoft's official statement is unambiguous: "Microsoft does not send unsolicited email messages or make unsolicited phone calls to request personal or financial information, or to provide technical support to fix your computer."

If you need tech support, type the company's name into your address bar, navigate from the home page to the support section, and use the contact methods listed there. Never call a number from a pop-up. Never call a number from an unsolicited email. Never call a number from a Google ad — search-result poisoning is now one of the top intake channels for tech-support scams. The r/techsupport community advice on the canonical case is direct: do not engage. Close the browser via Task Manager; do not call.

The intake channel varies. The script that follows it does not — every mask below funnels into the same remote-access endgame.

The 5 Variants

Variant #1
Full-Screen Browser-Pop-up Lockup ("Windows Locked")
⚠️ High
💬 Channel: Web browser. The victim lands on a malicious page (often via a redirect from a compromised ad), the page forces full-screen mode, and displays what looks like a native Windows recovery screen with a phone number, a Microsoft logo, and frequently an audio loop playing "your computer has been locked, do not shut down, call Windows Technical Support immediately."

A web page hijacks the victim's browser into full-screen mode, displays a fake "Windows locked due to unusual activity" warning with a phone number and Microsoft branding, and locks the victim out of normal navigation. The page is hosted on a legitimate Azure Blob Storage subdomain (or similar trusted host) to bypass URL-based detection. The phone number connects to a scam call center.

The r/Scams thread "Fake 'Windows locked due to unusual activity' full-screen scam" (117 upvotes) describes the textbook version. The author's screen suddenly switched to a full-screen "Windows Advanced options / Admin login" page that claimed: "Windows locked due to unusual activity. Asked for my Microsoft ID and password. Told me to call 'Windows Technical Support' at +1-888-977-1274 (toll-free). Warned not to shut down or restart the PC." The page was hosted on an Azure Blob Storage subdomain — a real Microsoft cloud service being abused to host the scam content, which made the URL look more legitimate to anyone who checked it. The author did not call. They closed the browser via Task Manager and ran a malware scan.

The community top reply (25 upvotes): "Open Task manager (Ctrl-Alt-Del) and end the Task. Check in Startup if something funny is listed. Do full malware scan." A second commenter noted: "They don't care. This has been around for more than a year now" — a reference to the slow pace at which Microsoft Azure responds to abuse reports for blob-storage-hosted scam pages. The scam is sticky precisely because the hosting infrastructure is legitimate; takedowns require Microsoft's abuse process, which can take days while the scam page continues to serve.

Kill the browser via Task Manager — never via the page's own buttons. The full-screen lockup is not a real Windows lock. The browser is being held in full-screen mode by a JavaScript trick; ending the browser process ends the page. On Windows: Ctrl+Alt+Delete → Task Manager → end the browser. On Mac: Command+Option+Esc → Force Quit. Then run a malware scan, in case the redirect installed any additional payload. Microsoft's Digital Crimes Unit takes down roughly 66,000 of these pages per year — and that's only the share it catches before the next batch spins up on the same Azure subdomain pool an hour later. The user-side defense is the only one that scales.

Red Flags

  • Browser switches to full-screen mode unexpectedly, often after clicking an ad or visiting a low-reputation site
  • Page displays a phone number with an "official" looking Microsoft, Windows Defender, or Apple logo
  • Audio loop or robotic voice repeats "your computer has been locked, do not shut down, call immediately"
  • URL bar (if visible) shows an Azure Blob Storage, Cloudflare Pages, or other legitimate-cloud-host subdomain — the scam page is hosted on a trusted service to evade URL filters
  • Page warns specifically not to shut down, restart, or close the browser — language designed to keep you on the page until you call

How to Avoid

  • Do not call the number. Real Microsoft and Apple do not put phone numbers in browser pop-ups. Period.
  • Force-quit the browser via Task Manager (Ctrl+Alt+Del → Task Manager on Windows; Command+Option+Esc → Force Quit on Mac). Do not click the page's "X" or "OK" buttons — they may trigger additional pop-ups.
  • When the browser reopens, do not "restore previous session" — that brings the malicious page back. Open a fresh blank window.
  • Run a reputable antivirus scan (Windows Defender is sufficient for most cases; Malwarebytes is a good second-opinion scanner).
  • Report the URL to Microsoft (microsoft.com/reportascam) and to the hosting provider's abuse address. The Microsoft Digital Crimes Unit took down approximately 66,000 of these domains since May 2024 — your report contributes.
"Open Task manager (Ctrl-Alt-Del) and end the Task. Check in Startup if something funny is listed. Do full malware scan." r/Scams top reply, on the Azure-blob fake-lockup case (25 upvotes)

The full-screen lockup is the most visible variant because it is loud — full-screen mode, audio loop, urgent text. The next variant is quieter and arrives in your inbox.

Variant #2
Geek Squad / Norton "Auto-Renewal" Email Refund Trap
⚠️ High
💬 Channel: Email. A "renewal invoice" arrives announcing your Geek Squad / Norton / McAfee subscription has been auto-renewed for $300–$500. The email includes a phone number to call to dispute the charge. Calling the number connects to a scam call center that walks the victim through a refund process designed to extract more money than the original fake charge.

An "auto-renewal" email lands in your inbox claiming a $300+ subscription has been renewed. You call the number to dispute. The scammer claims they will refund the charge and asks you to log into your bank to confirm receipt. They take remote control of your screen, manipulate the visible balance to make it appear the bank refunded too much, and demand the "overage" returned in gift cards or wire. Geek Squad was the most-impersonated company in FTC 2023 fraud data, with around 52,000 scam reports.

The FTC's consumer alert on the Geek Squad renewal scam describes the mechanic with unusual specificity: "Scammers take you to a spoofed website that looks real and tell you to enter your bank or credit card information to process the refund. After you do that, they claim there was an error in the amount entered and say they refunded you too much money, insisting you pay them back with gift cards, a wire transfer, a bank transfer, cryptocurrency, or a payment app." The "overage" is the entire scam. The scammer never actually refunded anything; they manipulated the on-screen view to make it look like a refund happened, often by overlaying the browser with their own fake banking interface or by editing the visible HTML of the bank page through their remote-access session.

The scale is large. Geek Squad has been the most-impersonated brand in FTC consumer fraud reports for multiple years running, with approximately 52,000 reports in 2023 alone. Norton, McAfee, Best Buy direct, and PayPal-themed renewal emails follow the same pattern. The emails are convincing: real Best Buy logos, real Geek Squad branding, plausible invoice numbers, real-looking subscription details. Older adults are the primary target — the FTC's October 2024 report found "consumers 60 and older were five times more likely to be victims of a tech support scam than people ages 18-59," with older consumers reporting "$175 million in losses to tech support scams in 2024."

So what stops it? Open a clean browser — not any link in the email — type the company's URL yourself (bestbuy.com, norton.com, mcafee.com, amazon.com, paypal.com), and check your subscriptions there. If the charge is real, your real account will show it. If it isn't there, the email is fake. Delete it, report it to the FTC at reportfraud.ftc.gov and to the impersonated company directly. Best Buy's own published guidance is identical: real Geek Squad renewal emails do not include a phone number. The presence of a phone number in a renewal email is itself the diagnostic.

Red Flags

  • Email about a $300–$500 subscription auto-renewal you do not remember signing up for
  • Phone number prominently displayed for "disputing" the charge — real renewal notices link to your account, not a phone number
  • Sender domain looks slightly off (geek-squad-billing.com, norton-renewal.com) rather than the real corporate domain
  • Urgency: "you have 24 hours to dispute," "click here to cancel before the renewal posts"
  • The amount is just high enough to provoke action ($300+) but just plausible enough for a real software subscription

How to Avoid

  • Never call a phone number from an email. Real subscription renewals do not include phone numbers — they link you to your account.
  • Log into your actual Best Buy / Norton / McAfee account from a clean browser (type the URL yourself, do not click email links). Check your subscriptions there.
  • If the charge does not appear in your real account, the email is a scam. Delete it. Report to reportfraud.ftc.gov.
  • If you already called the scam number but did not give them remote access or banking info, no harm done. Block the number, ignore further calls, and watch your bank statement for 30 days.
  • If you gave them your bank-account login or let them remote into your computer, see What to Do below — assume full compromise and act immediately.
"Scammers take you to a spoofed website that looks real and tell you to enter your bank or credit card information to process the refund. After you do that, they claim there was an error in the amount entered and say they refunded you too much money, insisting you pay them back with gift cards, a wire transfer, a bank transfer, cryptocurrency, or a payment app." FTC consumer alert on the fake Geek Squad renewal scam

The Geek Squad email scam pulls victims toward the scammer. The next variant flips the direction — the victim seeks out the scammer's number themselves, because Google surfaces it.

Variant #3
SEO-Poisoned "Microsoft Support" Google Number
⚠️ High
💬 Channel: Google search. The victim has a real problem (locked out of email, can't print, computer slow), Googles "Microsoft support phone number" or "Outlook customer service," and the top search result — often an ad, sometimes an organic result — is a fake support number that connects to a scam call center.

Victim has a legitimate tech problem and self-googles for help. The top result is a paid ad or SEO-poisoned page surfacing a fake "Microsoft support" number. The victim calls the number themselves — no inbound call, no pop-up, no email — which makes the engagement feel verified. The scammer then walks them through installing ConnectWise or AnyDesk for "diagnosis," and the rest of the script unfolds.

The r/Scams thread "ConnectWise scam for Microsoft Tech Support" (4 upvotes, but a high-quality victim post) describes the textbook self-googled version. The author was logged out of their Outlook account for too many failed attempts. They "researched online google a number to call Microsoft for help," called the number, and were told they had a "security breach." The scammer instructed them to download ConnectWise on their iPhone. The phone call lasted 34 minutes. The scammer asked the victim to access their bank accounts to check whether someone had been "successfully buying crypto" with their cards. The victim caught it — they noticed they were screen-sharing — and disconnected. They wrote, with the panic of someone who has just realized they were almost robbed: "How much do they have? How fast can they steal everything from me?"

"How much do they have? How fast can they steal everything from me?" — that single line, written by a victim mid-panic, is the moment every SEO-poisoned-search story arrives at if it doesn't get caught earlier. The fix is upstream of the search itself. Type the company's URL into your address bar (microsoft.com, apple.com, google.com), navigate from the home page to the support section, and use the contact methods listed there. Microsoft, Apple, Google, and Outlook all run official support pages with documented contact paths. The fact that a phone number appears at the top of Google does not mean Google has verified it — paid scam ads routinely outrank the legitimate company's own support page, and r/Scams' automod responses for `!techsupport`, `!refund`, and `!recovery` exist because the pattern is that common.

The reason this variant is so effective is the verification flip. In every other variant, the scammer initiates contact and the victim suspects "I didn't ask for this — why is it happening?" In the SEO-poisoned-search variant, the victim initiated contact themselves. They Googled it. They dialed the number. They believe they are the one driving the conversation. That self-initiated framing collapses the suspicion that protects victims in the inbound-call variants. Self-googled numbers are one of the most dangerous tech-support scam channels precisely because they feel safe.

Red Flags

  • You Googled the support number rather than typing the company URL and finding it on their website
  • The top Google result is an ad, often with "Sponsored" or "Ad" labeling
  • The phone number is in an organic search result on a generic-looking site (techhelp24.com, supportexpert.io) that is not the actual company's domain
  • The agent immediately wants remote access to your computer or phone "to diagnose"
  • The agent claims a security breach you did not contact them about — they pivot from your stated problem to a more urgent fictional one

How to Avoid

  • Type the company's URL into your address bar (microsoft.com, apple.com, google.com). Navigate from the home page to support. Use the contact methods listed there.
  • Do not call phone numbers from Google ads or search results, even if they look like the real company. Search-result poisoning is the dominant intake channel for tech-support scams.
  • For Microsoft support, the official entry point is support.microsoft.com (chat-based for most issues). For Apple, support.apple.com. For Outlook, log into outlook.com and use the in-product help.
  • If you've already called a Google-result number but have not granted access or shared anything sensitive: hang up, do not call back, ignore any callbacks, and verify the real support contact via the company's website.
  • If you've already granted remote access or shared bank info: see What to Do — assume full compromise.

The first three variants get the victim into the call. The fourth is what happens once they're on it.

Variant #4
Remote-Access Installation (ConnectWise / AnyDesk / Quick Assist)
⚠️ High
💬 Channel: Phone call (any of the above intake variants). The scammer instructs the victim to install ConnectWise ScreenConnect, AnyDesk, TeamViewer, or to open Microsoft Quick Assist. All four are legitimate remote-administration tools used by real IT departments — which is precisely what makes them effective in this context.

After the intake call begins, the scammer walks the victim through installing or opening a remote-access tool: ConnectWise ScreenConnect on Windows or iPhone, AnyDesk, TeamViewer, or Microsoft Quick Assist (built into Windows). Once installed, the scammer can see the victim's screen and move the mouse on the victim's behalf. They typically use this access to drain bank accounts, install additional malware, or stage the fake-refund overpayment trick.

The r/techsupport thread "Friend temporarily fell for a tech support scam" (114 upvotes) captures the standard mechanic. The friend got a "computer locked" pop-up, called a Microsoft-branded support number, and let the scammer remote into his laptop. The scammer took him to the registry editor where it shows real-but-confusing system entries and tried to sell him an antivirus. He hung up, turned off Wi-Fi, and turned the laptop off. The author asked: "if he watched the guy remotely access his computer the whole time and the scammer never tried opening up any documents or anything, how likely is it that any files or personal information were taken?"

The top community reply (90 upvotes) is the canonical answer: "An attacker had full remote access to your friend's PC. They could have done anything. You will not know exactly what they did. The safest course of action is to assume the whole PC is compromised. Any sensitive data, passwords, cookies for logged in websites etc, are potentially exposed to the scammers. Possibly the PC is infected with malware. The correct response in that case is to format the PC and do a clean Os install. Change passwords on all online accounts and configure MFA." A second commenter, 34 upvotes: "If he saw someone access the pc. Fully format it. Reset all passwords for everything. I would only need seconds to take whatever I need or plant whatever I want without the person knowing once I gained access."

Microsoft Quick Assist deserves separate attention. Microsoft tracks the cybercriminal group behind much of the Quick Assist abuse as Storm-1811. Per Microsoft's June 2025 blog: "In April 2024, Microsoft Threat Intelligence observations highlighted Storm-1811, a cybercriminal group abusing Windows Quick Assist to impersonate IT support, primarily using voice phishing (vishing) rather than AI to manipulate victims into granting remote access." Microsoft now blocks "an average of 4,415 suspicious Quick Assist connections each day, accounting for about 5.46% of all connection attempts" — meaning roughly one in twenty Quick Assist sessions Microsoft sees is flagged as potentially malicious. Microsoft has built warning prompts into Quick Assist and is rolling out further detection, but the tool's legitimate use case (remote IT help for grandparents, etc.) means it cannot simply be disabled.

The friend who turned off Wi-Fi in the r/techsupport thread didn't avoid the worst because he was lucky — he avoided it because he stopped engaging within minutes. What he didn't avoid was the days of cleanup: the format, the OS reinstall, the password resets, the credit-freeze paperwork, the unanswered question of what exactly did they look at. That residue is the real cost of a remote-access scam, and the only way to skip it is to never grant access. Never install ConnectWise, AnyDesk, TeamViewer, or open Microsoft Quick Assist at the request of an inbound caller. Real Microsoft support — the kind you reach by typing microsoft.com yourself — does not require remote-access tools to resolve most issues, and never asks you to install one without you having proactively scheduled the appointment from your account. The tools themselves are legitimate. The request to install one at an inbound caller's direction is the diagnostic.

Red Flags

  • Inbound caller asks you to install ConnectWise, AnyDesk, TeamViewer, LogMeIn, or to open Microsoft Quick Assist
  • Caller provides a "support code" or "session ID" to enter into the tool
  • Caller takes you to the Windows Event Viewer or Registry Editor and shows you "errors" — these are normal system entries that look alarming to someone unfamiliar with Windows internals
  • Caller offers an "antivirus" or "lifetime support package" for $200–$500 after "diagnosing" your problem
  • Caller insists you stay on the line, do not hang up, do not turn off the computer, do not talk to anyone else

How to Avoid

  • Never install remote-access software at the request of an inbound caller. If the request is to install it, the call is a scam.
  • If you are using Quick Assist for legitimate purposes (a family member helping you), verify the request via a different channel — a separate phone call, a text — before sharing the security code.
  • Microsoft Quick Assist now displays warning prompts for high-risk sessions. Read them carefully. If the prompt warns about granting full control, end the session.
  • If a caller has already taken you to the Event Viewer or Registry and shown you "errors," that itself is a strong signal — the contents of those tools look alarming but are routine system logs. Real support does not use Event Viewer to scare customers.
  • If you have already granted remote access, see What to Do below. The Reddit consensus is unambiguous: full OS reinstall, every password reset from a different device, 2FA on every account, credit freeze.
"An attacker had full remote access to your friend's PC. They could have done anything. You will not know exactly what they did. The safest course of action is to assume the whole PC is compromised. The correct response in that case is to format the PC and do a clean Os install. Change passwords on all online accounts and configure MFA." r/techsupport top reply, on the canonical remote-access case (90 upvotes)

Remote access is the platform. The fifth variant is the most common monetization route once that platform is in place.

Variant #5
Bank-Drain via Remote-Controlled Browser
⚠️ High
💬 Channel: After remote access is established (variant #4), the scammer walks the victim through logging into their own bank account "to verify" something — a refund, a security alert, a fraudulent charge. With the victim's bank credentials entered and the scammer in control of the browser, transfers happen in seconds.

Once remote access is established, the scammer asks the victim to log into their bank account "to confirm a refund" or "to check for fraudulent activity." The victim enters credentials. The scammer then either (a) initiates Zelle/wire transfers from the victim's account directly while the victim watches, (b) uses the fake-refund "overpayment" mechanic to convince the victim they have been overpaid and demands repayment via gift cards, or (c) silently extracts saved passwords, browser cookies, and stored financial info for later use.

The clearest first-person account of this variant lives on r/Scams under the title "Microsoft Security Scam. What do I do now?" The author had just bought a new laptop. They pulled up Facebook for the first time, clicked a friend request, and a Microsoft Security Team pop-up appeared with a phone call coming through almost simultaneously. They called. They granted remote access. The agent ran what looked like diagnostic reports, then said the victim's IP address had been compromised and their phone was being listened to. He asked yes/no questions: "Do you use online banking? Do you pay your bills online?" Each answer narrowed the script toward the bank-drain phase.

The pivot came when the agent told the author her phone was compromised and she needed to call "another secure number." She did. The second agent began downloading a program that was visibly not from Microsoft — the install prompt was the moment her suspicion broke through. She questioned him. He told her if she wouldn't continue he would hang up and she could "find her own computer repair person." The threat-to-leave is part of the script. It weaponizes the victim's sunk cost — the 30 minutes already spent, the embarrassment of admitting suspicion. She hung up. She got out before the bank-drain phase started. Most of the people who reach this point in the script do not.

If the script has reached your bank-account login, what's left is damage-control. Disconnect the device from the internet immediately. Call your bank's fraud line on the number printed on the back of your debit card — never a number the agent provided. Place a fraud hold on every account. Change every banking password from a different, uncompromised device. Watch statements daily for 90+ days. Place a credit freeze with all three bureaus. The FBI's IC3 reports note that older Americans alone reported nearly $4.9 billion stolen through fraud in 2024, a 43% year-over-year increase, with tech-support and call-center fraud as the dominant categories driving that climb. Speed matters more than completeness — a fraud hold placed in the first ten minutes recovers more than a perfectly documented one placed in the first hour.

Red Flags

  • Agent asks you to log into your bank account "to verify a refund," "to check for unauthorized charges," or "to make sure your account is safe"
  • Agent asks for your bank's customer-service phone number — they want to set up a three-way call with a fake "bank fraud officer"
  • Agent asks you to do nothing with your bank account for a period (don't use debit, don't pay bills, don't check the balance) — they want time to drain it without you noticing
  • Agent's screen shows a "refund amount" different from what you expected, and they claim the bank has refunded too much — the gift-card overpayment trick
  • Agent asks you to send "verification" payments via Zelle, gift cards, wire, or cryptocurrency before any "real" support can be performed

How to Avoid

  • Never log into your bank account during a tech-support call. There is no legitimate reason a Microsoft / Apple / Norton support agent needs to see your bank account.
  • If the agent claims a "refund" requires bank login, hang up. Real refunds go to the original payment method automatically — they do not require the agent to watch you log in.
  • If the agent sets up a "three-way call with your bank," hang up. Real bank fraud teams do not coordinate with third-party tech-support agents on calls you didn't initiate.
  • If you have already logged into your bank with a remote agent watching, see What to Do immediately. Time is the variable that determines loss size.
  • For elderly relatives at higher risk, set up bank alerts that notify a trusted family member of any transaction over a low threshold (say, $200) — a structural early-warning system that does not depend on the relative recognizing the scam.

The Numbers (and Where They Come From)

Every figure below is from a primary source with the verbatim quote on file in our research log.

$1.46B
FBI IC3 2024 tech-support fraud losses — the third-largest cybercrime category, after investment fraud ($6.57B) and Business Email Compromise ($2.77B). Combined call-center scams (tech support + crypto-exchange impersonation) reached $1.9B.
Source: FBI IC3 2024 Annual Report · ✓ verified
66,000
Malicious tech-support-scam domains and URLs proactively taken down by Microsoft's Digital Crimes Unit globally since May 2024. Microsoft also blocks an average of 4,415 suspicious Quick Assist connections daily — roughly 5.46% of all connection attempts.
Source: Microsoft DCU, June 2025 · ✓ verified
5x
Consumers 60+ are five times more likely to be victims of a tech-support scam than people 18–59, per the FTC's October 2024 report. Older consumers reported $175 million in tech-support-scam losses in 2024 alone.
Source: AARP citing FTC October 2024 · ✓ verified
215+
Arrests via 11 joint operations between the FBI, India's Central Bureau of Investigation, and other local law enforcement in 2024 — a 700% year-over-year increase. Most tech-support call-center operations run from India; the joint U.S.-India enforcement push is what scaled in 2024.
Source: FBI IC3 2024 Annual Report · ✓ verified

One additional fact worth knowing: tech-support fraud was the most frequently reported crime type by Americans over 60 in 2023, with nearly "$590 million in losses" that year alone (FBI via Microsoft DCU). Older Americans reported nearly "$4.9 billion stolen through fraud last year, with an average loss of $83,000. That's a stunning 43 percent more than last year" per the FBI's 2024 report. AARP research finds nearly "2 in 3 victims suffer a significant health or emotional impact" from these scams — the financial loss is one part; the cognitive and emotional toll is the other.

📌 Why tech-support scams aren't going away (and what's actually working)

Three structural factors make tech-support scams persistent. First: the underlying tools (ConnectWise, AnyDesk, TeamViewer, Quick Assist) are legitimate IT-administration software with real and valuable use cases — they cannot be banned. Second: the call centers operate primarily from India, beyond the direct reach of U.S. domestic law enforcement, requiring international cooperation that has historically been slow. Third: older adults remain disproportionately targeted because the scripts exploit a real cognitive asymmetry — fear of having "broken" the computer, deference to brand authority, and unfamiliarity with what "remote access" actually grants.

Two interventions have begun to bite. The FBI–India Central Bureau of Investigation joint operations conducted 215+ arrests in 2024 across 11 coordinated raids — a 700% year-over-year increase that suggests the diplomatic groundwork from 2022–2023 has matured into operational tempo. Microsoft's Digital Crimes Unit has gotten faster at takedowns: the 66,000 malicious domains and URLs removed since May 2024 represent a higher-cadence response than the company managed in prior years. Microsoft also reports blocking "US$4 billion worth of fraud attempts over the past year" across all categories — the bulk of which is tech-support and call-center fraud.

Three things would meaningfully accelerate progress. First: stricter ad-platform vetting on Google Ads for tech-support keywords (the SEO-poisoned Google number variant remains one of the top intake channels because paid scam ads regularly outrank legitimate company support pages). Second: a built-in "this is a high-risk session" warning on Microsoft Quick Assist that mirrors macOS's screen-recording-permission prompt, with friction proportional to risk. Third: more state-level consumer-protection enforcement — particularly state attorneys general working with telecom carriers to block known scam-call infrastructure at the carrier level. None of these is a complete fix; each chips away at a portion of the funnel.

Recovery Reality (and Why Full Reformat Is the Right Answer)

Recovery from a tech-support scam splits into two parallel tracks: the financial side (getting money back) and the device side (cleaning up the compromised computer or phone). Neither is fast.

On the financial side, recovery rates are low. If the loss came through gift cards, recovery is essentially zero — gift-card balances are typically extracted within minutes of the codes being shared. If the loss came through wire transfer, the FBI's Recovery Asset Team (FBI-RAT) can sometimes claw back funds if reported within hours, but the success rate drops sharply after 24 hours. If the loss came through Zelle or another P2P app, see our Bank-Impersonation & Zelle Scams page — banks reimbursed only 12% of disputed Zelle scam claims in 2023 per the Senate Permanent Subcommittee on Investigations. Credit-card chargebacks have the highest recovery rate but require disputing within 60 days. File at ic3.gov within 24 hours regardless — the IC3 reports drove the 215+ arrests in 2024.

On the device side, the Reddit and r/techsupport consensus is uniform: "format the PC and do a clean OS install." Antivirus scans alone are insufficient because a scammer with full remote-access privileges may have installed payloads (rootkits, custom keyloggers, persistence mechanisms) that are not in any antivirus signature database. The conservative response is: disconnect the device from the internet, take it to a reputable repair shop, request a clean OS reinstall (not a "factory reset" — those preserve some data partitions), change every password from a different, uncompromised device, enable two-factor authentication on every account, and place a credit freeze with all three credit bureaus. Watch bank and credit-card statements daily for at least 90 days.

Identity recovery is the long tail. If the scammer exfiltrated tax documents (a common target — tax docs contain SSN, prior addresses, employer information), monitor for tax-return identity theft when filing season comes around. The IRS's Identity Theft Central tracks the recovery process. Consider filing a Form 14039 Identity Theft Affidavit preemptively if you have evidence of tax-document exfiltration. The blunt summary: assume the scammer has anything that was on the device, and act accordingly.

🆘 What to Do If You Engaged with a Tech-Support Scammer

📵 Disconnect the Device — Now

Unplug the Ethernet cable, turn off Wi-Fi, or power down the device entirely. While the device is online, the scammer may still have access. While it is offline, they cannot exfiltrate further data or initiate further transactions.

📞 Bank Fraud Line — From a Different Device

Call the number on the back of your debit card from a phone that the scammer has not had access to. Place a fraud hold on every account. If you used the compromised device to log into a bank, treat that account as compromised regardless of what the scammer appeared to do.

🔄 Full OS Reinstall (or Repair Shop)

Take the compromised device to a reputable local repair shop. Tell them remote-access tools were installed and you need a clean OS reinstall — not a "factory reset." Antivirus scans alone are not sufficient when the attacker had full administrator privileges.

🔑 Reset Every Password — From Another Device

Use a different, uncompromised device to reset every password (email, banking, social media, work accounts). Enable two-factor authentication on every account that supports it. Prioritize email first — email controls password resets for every other account.

🏛 FBI IC3 + FTC + Microsoft

File at ic3.gov (drives FBI–India joint operations), at reportfraud.ftc.gov (drives FTC enforcement priorities), and at microsoft.com/reportascam (drives Microsoft DCU domain takedowns). Reporting builds the cases.

🛡 Credit Freeze (3 Bureaus)

Place a credit freeze with Experian, Equifax, and TransUnion. Freezes are free, take about 5 minutes per bureau, and prevent any new credit account from being opened in your name. The scammer may have exfiltrated SSN-equivalent data; a freeze is the structural defense.

📖 Coming Soon · tabiji.ai General Scams
If you're sharing this page with a 60+ relative, the full book covers 30+ scams across phone, text, online, and in-person channels — same federal-source-verified research as this guide.
See current titles →

If You're Reporting Outside the United States

Tech-support scams are global. The Microsoft / Apple / Norton brand impersonation works in any country where those brands are used; the call-center infrastructure (largely in India) services victims worldwide. Reporting paths:

Frequently Asked Questions

A tech-support scam is a social-engineering attack in which a scammer impersonates a major technology company (Microsoft, Apple, Norton, Geek Squad) and convinces a victim to grant remote access to their computer, then extracts money via fake refund overpayment, fake antivirus subscriptions, gift cards, or direct bank-account drain. The FBI's 2024 Internet Crime Report puts losses at $1.46 billion — the third-largest source of cybercrime fraud after investment fraud and Business Email Compromise. Microsoft's Digital Crimes Unit reports taking down approximately 66,000 malicious tech-support-scam domains and URLs since May 2024.
Real Microsoft, Apple, Norton, and Geek Squad will never call you or display a phone number in a pop-up. Every inbound call, pop-up phone number, and "support chat" from one of these brands is a scam. The defense rule: if you genuinely need tech support, type the company's name into your browser yourself, navigate from the company's home page to its support page, and use the contact methods listed there. Never call a number from a pop-up. Never call a number from a Google ad. Never let anyone you didn't independently verify install software on your computer or phone. Microsoft's official statement: "Microsoft does not send unsolicited email messages or make unsolicited phone calls to request personal or financial information, or to provide technical support to fix your computer."
The FTC's October 2024 report found consumers 60 and older are five times more likely to be victims of a tech-support scam than people ages 18–59, with older consumers reporting $175 million in losses to tech-support scams in 2024. Three reasons: (1) older adults are more likely to trust authoritative-sounding callers from major brands, (2) they are less likely to recognize a fake browser pop-up as a fake, and (3) the scripts deliberately exploit fear of having "broken" their computer or "gotten a virus" — a fear amplified by less day-to-day computing experience. Tech-support fraud was the most frequently reported crime type by Americans over 60 in 2023, with nearly $590 million in losses that year alone.
Assume full compromise. The correct response is a full operating-system reinstall — not just an antivirus scan, not just removing the remote-access software. The r/techsupport top reply on the canonical case is direct: "An attacker had full remote access to your friend's PC. They could have done anything. You will not know exactly what they did. The safest course of action is to assume the whole PC is compromised. The correct response in that case is to format the PC and do a clean OS install. Change passwords on all online accounts and configure MFA." Disconnect the device from the internet, take it to a reputable repair shop or use another (uncompromised) device to download a fresh OS install, change every password from a different device, enable two-factor authentication on every account, file a credit freeze with all three bureaus, and watch your bank statements daily for at least 90 days.
An email arrives saying your Geek Squad / Best Buy / Norton / McAfee subscription has been auto-renewed for $300–$500, with a phone number to call to dispute the charge. Geek Squad was the most-impersonated company in FTC consumer fraud data for 2023, with around 52,000 scam reports. The scam unfolds in two phases: first, the caller claims they will refund the charge and asks the victim to log into their bank account to confirm receipt of the refund; second, the caller manipulates the victim's screen via remote-access software to make it appear that the bank has been refunded too much money — and demands the "overage" be returned via gift cards, wire transfer, or cryptocurrency. The FTC's official guidance: "Scammers take you to a spoofed website that looks real and tell you to enter your bank or credit card information to process the refund. After you do that, they claim there was an error in the amount entered and say they refunded you too much money, insisting you pay them back with gift cards, a wire transfer, a bank transfer, cryptocurrency, or a payment app."
By framing it as "official support software." On the phone, the scammer instructs the victim to open a browser, type a specific URL, and install the application — claiming it is the company's diagnostic tool. ConnectWise ScreenConnect, AnyDesk, and TeamViewer are all legitimate remote-administration tools used by real IT departments, which is exactly what makes them dangerous in this context. Microsoft Quick Assist is built into Windows; the cybercriminal group Microsoft tracks as Storm-1811 abuses Quick Assist via voice phishing. Microsoft now blocks an average of 4,415 suspicious Quick Assist connections each day, accounting for about 5.46% of all connection attempts. The mitigation: never install remote-access software at the request of an inbound caller. Real Microsoft and Apple support do not require this — and would not call you to begin with.
Report to (1) the FBI's Internet Crime Complaint Center at ic3.gov — IC3 reports drove the 215+ arrests via 11 joint operations between the FBI and India's Central Bureau of Investigation in 2024, a 700% increase from the prior year, (2) the FTC at reportfraud.ftc.gov — the FTC tracks impersonation rankings publicly and Geek Squad has been the most-impersonated brand for multiple years running, (3) Microsoft directly at microsoft.com/reportascam — Microsoft's Digital Crimes Unit has taken down approximately 66,000 malicious domains and URLs since May 2024 based on reports, (4) Apple at [email protected] if the impersonation was Apple-branded, and (5) your state attorney general's consumer-protection unit. Reporting is what builds the cases — the IC3 arrests in 2024 happened because thousands of victims reported.
Within minutes for the first transfer; within hours for the maximum extractable balance. The mechanism varies by the scam variant: in remote-access cases, the scammer can directly initiate Zelle, wire, or bill-pay transactions from your screen while you watch; in Geek-Squad-refund cases, the scammer manipulates the on-screen view to make it appear that an overpayment occurred, then demands the "overage" returned via gift cards or wire. Either way: disconnect the device from the internet immediately, call your bank's fraud line on the number printed on the back of your debit card (not any number provided by the scammer), and place a fraud hold on every account. The FBI's IC3 report notes that older Americans alone reported nearly $4.9 billion stolen through fraud in 2024, with an average loss of $83,000 — a 43% increase year over year. Tech-support and call-center fraud were the dominant categories driving that increase.

📚 Source Threads (Reddit, 2024–2026)

The two-day neighbor case

"My friend/neighbor fell for the Microsoft Support scam" — r/techsupport, 127 upvotes (as of Apr 2026). The canonical full-script case: pop-up → call → remote access → fake bank three-way → two-day extraction.

The Azure-blob fake lockup

"Fake 'Windows locked due to unusual activity' full-screen scam" — r/Scams, 117 upvotes. Documents the Azure Blob Storage hosting trick that lets scam pages bypass URL filters.

The remote-access damage assessment

"Friend temporarily fell for a tech support scam, had someone remotely access his laptop" — r/techsupport, 114 upvotes. Top reply (90 upvotes) is the canonical "format the PC, change every password" answer.

The new-laptop FB-popup variant

"Microsoft Security Scam. What do I do now?" — r/Scams, 10 upvotes. First-person victim view of the bank-drain attempt; victim disconnected in time.

The self-googled ConnectWise variant

"ConnectWise scam for Microsoft Tech Support" — r/Scams, 4 upvotes. Documents the SEO-poisoned-search intake — victim Googled the support number themselves.

The Microsoft DCU public report

"Microsoft dismantles transnational scam infrastructure" — Microsoft on the Issues blog, June 2025. Source for the 66,000 domain takedowns, Storm-1811 attribution, and the 4,415 Quick Assist daily blocks.

Related Reading

Tech-support scams overlap with several other scam mechanisms documented on tabiji. Internal: the Everywhere hub; Bank-Impersonation & Zelle Scams (the bank-drain monetization phase often uses Zelle as the rail); AI Voice-Clone Scams (an emerging adjacent category — cloned IT-support voices targeting corporate help desks for MFA reset); Pig-Butchering Scams (different intake but similar bank-drain mechanics in the extraction phase). External authorities: the FBI IC3 2024 Annual Report; the Microsoft DCU June 2025 blog on the Storm-1811 disruption; the FTC consumer alert on the fake Geek Squad renewal; the AARP tech-support-scam research summary.

📖 Coming Soon

A field-guide to the scams happening everywhere — phone, text, online, in person.

tabiji's tourist-scam atlases cover 17 countries. The next book is different — it covers the scams that don't care where you live: tech-support pop-ups, bank-impersonation Zelle scams, real-estate wire fraud, AI voice clones, pig-butchering, fake job offers, and dozens more. Same research method (FBI / FTC / Microsoft / CFPB sources cross-referenced with thousands of Reddit victim threads). Same $4.99 Kindle price.

  • 30+ scams documented across phone, text, online, and in-person channels
  • The script, the red flags, and the exit lines that end each conversation
  • Family-intervention scripts for elderly relatives in active scams
  • U.S. and international reporting paths (IC3, FTC, CFPB, Action Fraud, CAFC, Scamwatch)