December 22, 2021 By David Bisson 2 min read

Got a pop-up message from tech support? It’s probably not the real thing. Tech support scams were the top phishing threat for organizations in the third quarter of 2021, reported NortonLifeLock.

Tech support scam takeaways

The consumer antivirus company reported that it blocked over 12.3 million tech support URLs connected with scam attempts between July and September. At this volume, tech support scams served as the top phishing threat during that period.

Those numbers weren’t a surprise. For instance, Microsoft noted that, while the numbers of this kind of scam reported to them generally fell since 2018, 60% of consumers faced a tech support scam between July 2020 and July 2021. One in six of those people fell for the ruse. In response, 30% of victims suffered computer problems. This was followed by compromised passwords and fraudulent use of payment cards at 23% and 18%, respectively.

Out of all the age groups surveyed, millennials and Gen Zers experienced the greatest exposure to tech support phishing scams. One-tenth of respondents from both age groups fell for the ploy, losing money in the process.

Why tech support scams are more pertinent than ever

According to NortonLifeLock, tech support phishing scams became more pervasive following the events of 2020 for two reasons. First, users became more reliant on computers, smartphones and other devices to do their work, go to school, get their groceries and complete other daily tasks. Malicious actors took advantage of this increased use with the knowledge that they could expand their base of potential victims.

Second, tech support scams have a history of working. Why? Like other types of phishing, they rely on social engineering first and foremost. This lowers the barrier of entry for many digital attackers, as a lack of technical expertise doesn’t prohibit them from targeting someone.

These tech support scams claim all different types of people as victims. Young people, the elderly and even people who track down scammers on the web can fall for it. That’s what happened to the creator of the Tech Support Scams YouTube channel in July. Scammers contacted the YouTube creator while pretending to be support representatives for the platform. Those attackers didn’t steal the creator’s account credentials, wrote The Register, but they did manage to trick him into at least temporarily deleting his channel.

How to defend against tech support scams

For organizations to defend themselves against tech support phishing scams, they need to invest in their employee security awareness training programs.

NortonLifeLock recommended that organizations educate their employees to never call a number contained in a pop-up ad or message warning of computer issues. Through their employer’s security modules, they can learn to inform IT and/or to contact the tech company being impersonated instead.

At the same time, security firms can use threat intelligence to keep their employees informed about relevant scam attempts. This is especially pertinent around the holidays when the security community witnesses a rise in shopping fraud attempts and charity phishing scams.

More from News

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

CISA and FBI release secure by design alert on cross-site scripting 

3 min read - CISA and the FBI are increasingly focusing on proactive cybersecurity and cyber resilience measures. Conjointly, the agencies recently released a new Secure by Design alert aimed at eliminating cross-site Scripting (XSS) vulnerabilities, which have long been exploited to compromise both data and user trust. Cross-site scripting vulnerabilities occur when a web application improperly handles user input, allowing attackers to inject malicious scripts into web pages that are then executed by unsuspecting users. These vulnerabilities are dangerous because they don't attack…

Has BlackCat returned as Cicada3301? Maybe.

4 min read - In 2022, BlackCat ransomware (also known as ALPHV) was among the top malware types tracked by IBM X-Force. The following year, the threat actor group added new tools and tactics to enhance BlackCat's impact. The effort paid off — literally. In March 2024, BlackCat successfully compromised Change Healthcare and received a ransom payment of $22 million in Bitcoin. But here's where things get weird: Immediately after taking payment, BlackCat closed its doors, citing "the feds" as the reason for the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today