Remote tech support scams are on the rise. Cyber criminals are exploiting the current reliance on remote technology due to the COVID-19 pandemic through phishing emails, phone calls, or pop-up messages.
These scams typically involve criminals impersonating legitimate companies, such as Apple or Microsoft. They use fear and intimidation to gain control over people's computers and personal information, often through scareware pop-ups saying your computer has been hacked, or you’ve been charged a large amount of money and have a limited time to get a refund. Their ultimate goal is to coax their victims to provide remote access to their computers, share confidential information, or pay for fake technology support services.
Take the following actions to avoid these scams:
If you receive a phone call that you didn’t expect from someone claiming to know there is a problem with your computer or account, hang up.
If you see a popup alert on your computer asking you to call a telephone number, do not call the number. Legitimate alerts do not ask you to call a number.
If you receive an email with a bill for technical support services stating you must contest the charges over the phone, do not call the number. Businesses you have a legitimate relationship with will not contact you in this way.
Do not let anyone outside of LSA Technology Services install software or take control of your U-M device.
Do not allow unknown individuals or remote tech support access to your personal computer or devices.
When in doubt, contact the LSA Technology Services Service Center. We’re here to help! For help with your personal device, contact the University Tech Shop.
Remember, legitimate tech or customer support representatives will never send unsolicited messages to customers. Tech support representatives never demand payment immediately or ask for payment in cash, prepaid gift cards, cryptocurrency, or wire transfers.
Being educated and vigilant is key to preventing these scams. Always question the legitimacy of unexpected tech support communication and consult with trusted individuals or organizations before taking any action.
For additional tips, check out our Protect Your Personal Devices checklist, which showcases a list of university and LSA resources you can use to protect personal computers, tablets, and smartphones; this is especially important and expected when accessing university systems and data. There is also a lot of helpful information on the ITS Safe Computing website.