December 22, 2021 By David Bisson 2 min read

Got a pop-up message from tech support? It’s probably not the real thing. Tech support scams were the top phishing threat for organizations in the third quarter of 2021, reported NortonLifeLock.

Tech support scam takeaways

The consumer antivirus company reported that it blocked over 12.3 million tech support URLs connected with scam attempts between July and September. At this volume, tech support scams served as the top phishing threat during that period.

Those numbers weren’t a surprise. For instance, Microsoft noted that, while the numbers of this kind of scam reported to them generally fell since 2018, 60% of consumers faced a tech support scam between July 2020 and July 2021. One in six of those people fell for the ruse. In response, 30% of victims suffered computer problems. This was followed by compromised passwords and fraudulent use of payment cards at 23% and 18%, respectively.

Out of all the age groups surveyed, millennials and Gen Zers experienced the greatest exposure to tech support phishing scams. One-tenth of respondents from both age groups fell for the ploy, losing money in the process.

Why tech support scams are more pertinent than ever

According to NortonLifeLock, tech support phishing scams became more pervasive following the events of 2020 for two reasons. First, users became more reliant on computers, smartphones and other devices to do their work, go to school, get their groceries and complete other daily tasks. Malicious actors took advantage of this increased use with the knowledge that they could expand their base of potential victims.

Second, tech support scams have a history of working. Why? Like other types of phishing, they rely on social engineering first and foremost. This lowers the barrier of entry for many digital attackers, as a lack of technical expertise doesn’t prohibit them from targeting someone.

These tech support scams claim all different types of people as victims. Young people, the elderly and even people who track down scammers on the web can fall for it. That’s what happened to the creator of the Tech Support Scams YouTube channel in July. Scammers contacted the YouTube creator while pretending to be support representatives for the platform. Those attackers didn’t steal the creator’s account credentials, wrote The Register, but they did manage to trick him into at least temporarily deleting his channel.

How to defend against tech support scams

For organizations to defend themselves against tech support phishing scams, they need to invest in their employee security awareness training programs.

NortonLifeLock recommended that organizations educate their employees to never call a number contained in a pop-up ad or message warning of computer issues. Through their employer’s security modules, they can learn to inform IT and/or to contact the tech company being impersonated instead.

At the same time, security firms can use threat intelligence to keep their employees informed about relevant scam attempts. This is especially pertinent around the holidays when the security community witnesses a rise in shopping fraud attempts and charity phishing scams.

More from News

Has BlackCat returned as Cicada3301? Maybe.

4 min read - In 2022, BlackCat ransomware (also known as ALPHV) was among the top malware types tracked by IBM X-Force. The following year, the threat actor group added new tools and tactics to enhance BlackCat's impact. The effort paid off — literally. In March 2024, BlackCat successfully compromised Change Healthcare and received a ransom payment of $22 million in Bitcoin. But here's where things get weird: Immediately after taking payment, BlackCat closed its doors, citing "the feds" as the reason for the…

Biden-⁠Harris administration releases roadmap to enhance internet routing

2 min read - The Biden-Harris Administration has taken another step toward improving the nation’s cybersecurity. In September, the White House Office of the National Cyber Director (ONCD) announced it was putting policies in place to address a key security vulnerability associated with the Border Gateway Protocol (BGP). BGP is a set of rules that helps the internet work by selecting the best route for data to travel between networks. It is a fundamental protocol that allows networks to communicate with each other. However,…

CISA warns about credential access in FY23 risk & vulnerability assessment

3 min read - CISA released its Fiscal Year 2023 (FY23) Risk and Vulnerability Assessments (RVA) Analysis, providing a crucial look into the tactics and techniques threat actors employed to compromise critical infrastructure. The report is part of the agency’s ongoing effort to improve national cybersecurity through assessments of vulnerabilities in key sectors. Meanwhile, IBM’s X-Force Threat Intelligence Index 2024 has identified credential access as one of the most significant risks to organizations. Both reports shed light on the persistent and growing threat of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today