A tech support scam takes control of your device, locks you out of accounts, and exposes your personal data. In 2023, victims lost $3.4 billion, with seniors being five times more likely to fall for this scam.
But these scams are getting worse with AI-generated voices, deepfake tech, and fake Microsoft support pages.
Let’s break down how they work, what’s new in 2025, and how to stay safe.
How Tech Support Scams Work

The Federal Trade Commission reported that in 2024 alone, consumers lost over $165 million to these scams. Here’s how these fraudsters operate:
Step 1: Fake Pop-Up or Phishing Email
It starts with a pop-up warning, phishing email, or fake website claiming your computer is infected or compromised. This pop-up message flash phrases like “Your device is at risk!” or “Immediate action required!” Some of these pop-ups even copy real security alerts, making them harder to spot.
Step 2: Urgent Message and Fake Support Number
This alert often comes with a customer support number, claiming to connect you to a certified technician. But instead of Microsoft, Apple, or well-known security companies, the call goes straight to scammers. These representatives sound professional and may even have background noise to make it seem like a legitimate call center.
Step 3: Remote Access Request
Next, they’ll ask you to install remote access software like AnyDesk or TeamViewer so they can “fix” the issue. But if you grant them access, they can steal files, install malware, or even lock you out of your own device.
Step 4: Fake Virus Removal or Refund Setup
With access to the device, they’ll run fake diagnostic tests and claim they’ve found major issues. Some of these representatives might exploit and push a fake refund, saying they “accidentally” sent too much money and need you to return it. They’ll also ask you to log into your bank, so they can manipulate transactions and steal your funds.
Step 5: Financial Theft or Data Breach
By the time you’d realize what’s happening, they’d have already taken what they wanted. They can also charge you hundreds of dollars for fake security services, steal your personal information, or install keyloggers to capture your passwords for future fraud.
The Most Common Tech Support Scam Methods
Tech support scams might come in different forms. Here are some of the tech support scams you need to watch out for.
Fake Microsoft Helpdesk Pages
One of the most convincing tech support scams involves fraudulent Microsoft support sites. These pages copy real Microsoft branding, complete with logos, customer service numbers, and even fake chat support. And if you enter your details, scammers will call you pretending to be official representatives.
Search Query Hijacking
Instead of relying on ads, scammers manipulate search algorithms to rank their fake pages higher in organic results. They use deceptive keywords, fake customer reviews, and website optimizations to make their scam pages appear trustworthy.
Chatbot Scams
AI-powered chatbots are also being used in these tricks. They respond instantly on fake tech support sites and guide victims through fake troubleshooting steps. These chatbots also guide users into downloading malware disguised as antivirus software or entering payment details on fake checkout pages.
New Tactics in 2025
With tech support scams becoming more sophisticated, here’s what’s changing:
- AI-Generated Scam Calls: Scammers use AI to clone real customer service voices. These calls sound convincing, making it easier to trick people.
- Deepfake Tech Support Videos: Fake tutorial videos now guide people into downloading malware disguised as legitimate software.
Wondering if you’re talking to a real tech support agent or not? Run a verification search:
How to Identify a Tech Support Scam
If you know what to look for, you can spot the warning signs before falling for their tricks. Here’s how to identify a scam before it’s too late.
Red Flags in Pop-Ups and Emails
Fake tech support scams are designed to trigger panic, but they have warning signs if you look closely. Before clicking on a security warning, ask yourself:
Does it Have Typos?
Official security alerts from companies like Microsoft or Apple do not contain spelling mistakes or awkward phrasing. If a message feels off, it’s likely a scam.
Does it Demand Immediate Action?
Scam pop-ups use vague threats like “Your system is at risk!” or “Security breach detected!” without naming the issue. Plus, phrases like “Call support now before your data is deleted!” are designed to pressure you.
Does the Sender Look Legit?
Scammers copy logos but often mess up fonts, colors, or website links. Always check the email address. If it looks odd, don’t trust it.
Suspicious Behavior During Calls
While tech support scammers pretend to be professional, these actions expose them as scammers:
- Pressure to Act Immediately: They push victims to install remote access software within minutes, skipping any real troubleshooting.
- Refusal to Give a Callback Number: They avoid providing a direct contact or case number to prevent verification.
- Unusual Payment Requests: They demand payment through gift cards, wire transfers, or cryptocurrency, which are difficult to trace.
How to Check If a Company Is Real
Scammers impersonate real tech support teams. Here’s how to verify the legitimacy of a company before engaging:
- Search the Official Website: Instead of clicking links in emails or pop-ups, manually type the company’s website into your browser and look for an official support page.
- Verify Phone Numbers and Emails: Use Social Catfish’s search tools to check if a support number or email is linked to a legitimate company or reported scams.
- Look for Business Registration Details: Scammers often create fake websites that look identical to real tech support pages. Before trusting a company, check if it has a legitimate history by searching its name on official databases like the Better Business Bureau (BBB).
How to Protect Your Devices and Data

While scammers rely on deception, the right precautions can block their attempts before they reach you. Let’s look at how to safeguard your devices and personal information.
Blocking Scam Attempts
Here’s how adjusting your settings can help stop them:
- Enable Browser Security Settings: Most browsers have built-in protections. In Chrome, go to Settings > Privacy and Security > Security and turn on Enhanced Protection to block deceptive sites.
- Use Security Extensions: Extensions like Malwarebytes Browser Guard or uBlock Origin block malicious ads and prevent fake pop-ups.
- Screen Unknown Calls: Use call-blocking apps like Hiya or enable your phone’s silence unknown callers feature to avoid scam calls.
Safe Browsing Habits
Many scams start with a single click. Here’s how to prevent trouble:
- Check URLs Carefully: Scammers create lookalike domains such as “learn.microsoft.com” instead of “microsoft.com.” Always type official URLs manually instead of clicking on ads.
- Avoid Suspicious Ads: Never click on pop-ups or banner ads claiming your device is infected.
Is a tech support agent pressuring you to act fast? Before giving access to your device, verify their identity with our search specialist service to avoid scams.
Here’s what users say about their experience with our service:
“Erin was very friendly but professional and got right to the point. I didn’t have to wait hardly at all and everything was taken care of within a minute or two cuz I didn’t understand some of the directions but she made it very clear to me and I appreciate it very much” – Steven







