Beware of Online Technical Support and Customer Service Helpline Scams
December 28, 2015
Scammers have created fake Hotmail Customer Service, Canon Printer Customer Service, Mac Mail Customer Service, Gmail Password Recovery Technical Support, McAfee Customer Service and Yahoo Customer Service websites, Facebook pages, and other social media web pages, in an attempt to trick online users into calling bogus toll-free numbers. Once potential victims have called the bogus numbers, the scammers will attempt to trick the callers into giving them their online accounts’ credentials, personal and financial information, by pretending to be technical or customer service helpline representatives.
Please continue reading below.
Scammers are using the following fake technical/customer phone numbers to trick their potential victims into calling them, thinking they are calling a real technical/customer helpdesk.
The Fake Technical/Customer Telephone Numbers
We will add more numbers when we receive them, because scammers will no doubt use other numbers as soon as the numbers they are currently using have been discovered as fraudulent.
How the Scam Works?
Scammers post the fake toll-free numbers on social media websites like Facebook, Twitter, LinkedIn, Slideshare, Google+ and Youtube, where the fake phone numbers can be easily shared with millions of online users. Once the potential victims call the fake numbers, they will be asked by a real person or an automated system for their online account credentials, personal and financial information. Once the scammers have received their victims’ information, they will use it to hijack their online accounts, steal their identities and money.
Potential victims may also be tricked into downloading and installing malicious software, which will infect their computers with a malware called a Trojan horse, or they may be tricked into downloading and installing legitimate remote desktop software, to allow remote access to their computers.
Once the potential victims’ computers are infected with a Trojan horse, the scammers will be able to remotely take control of their computers from anywhere in the world. Once the scammers have access to their potential victims’ computers, they will spy on them, steal their information, and may use the computers to commit other cyber-crimes, which will be traced back to the victims.
The scammers may also trick their victims into downloading and installing legitimate remote desktop software, and trick the potential victims into giving them access to their computers via the same remote desktop software. Once the scammers have access to their potential victims’ computers, they will also spy on them and steal their personal and financial information.
Victims of the technical/customer scam should change their online accounts’ passwords, contact their banks and report the scam to their local authorities.
Remember, be careful on social media websites, because not everything posted on them are real. Scammers are using social websites to find potential victims by creating fake pages and posting bogus information on them, in order to find potential victims and scam them.
Please share with us what you know or ask a question about this article, by leaving a comment below. And, forward malicious email messages to us using the following email address: email@example.com .
Alert and help your family and friends by sharing this article with them: