Tech support scams have reached alarming new heights following recent Havoc malware attacks that compromised thousands of computers worldwide. Cybercriminals are exploiting the chaos by posing as legitimate technical support staff, tricking victims into handing over personal information, banking details, and remote access to their devices.
These scammers have become increasingly sophisticated, but they still leave telltale signs. Knowing what to look for can save you from financial loss and identity theft. Here are seven critical red flags that signal you’re dealing with a fake tech support scam.
1. Unsolicited Contact from “Tech Support”
Legitimate tech companies never call, email, or text you out of the blue to warn about security issues on your computer. If someone contacts you claiming to be from Microsoft, Apple, or your internet service provider without you initiating contact, it’s almost certainly a scam.
Real tech support only responds when you reach out first through official channels. They don’t monitor your device remotely and then call to alert you about problems. According to the Federal Trade Commission, Americans lost over $347 million to tech support scams in recent years, with most incidents starting from unexpected contact.
2. Urgent Language and Scare Tactics
Scammers rely on creating panic to cloud your judgment. They’ll claim your computer is infected with dangerous viruses, your personal information has been compromised, or your system will crash within hours if you don’t act immediately.
Watch for phrases like “critical security alert,” “your system is at risk,” or “immediate action required.” Legitimate tech companies communicate calmly and never pressure you into instant decisions. They provide clear information and give you time to verify their identity and consider your options.
3. Requests for Remote Access to Your Device
One of the most dangerous aspects of tech support scams is when criminals ask you to install remote access software like TeamViewer, AnyDesk, or LogMeIn. Once installed, these programs give scammers complete control over your computer.
While remote access tools are legitimate software used by real IT professionals, scammers abuse them to steal files, install malware, access saved passwords, and monitor your keystrokes. Never grant remote access to someone who contacted you first, regardless of how convincing they sound.
4. Payment Requests Through Unusual Methods
Scammers typically demand payment through methods that are difficult to trace or reverse. They’ll ask for gift cards, wire transfers, cryptocurrency, or prepaid debit cards rather than standard credit card payments through secure, verifiable channels.
If someone asks you to buy iTunes gift cards, Google Play cards, or Amazon gift cards to pay for tech support services, you’re definitely dealing with a scam. No legitimate business operates this way. Real companies offer transparent pricing and accept conventional payment methods with proper receipts and documentation.
5. Poor Communication and Suspicious Contact Details
Many tech support scammers work from overseas call centers and may have strong accents or struggle with English. While accent alone isn’t proof of a scam, combined with other red flags, it warrants caution.
Check their contact information carefully. Scammers often provide email addresses from free services like Gmail or Yahoo rather than official company domains. Their phone numbers may be unlisted or show up as spam when searched online. The Cybersecurity and Infrastructure Security Agency recommends always verifying support contacts through official company websites rather than using numbers provided by callers.
6. Pop-Up Warnings That Lock Your Screen
You’re browsing the internet when suddenly a full-screen warning appears claiming your computer is infected. It includes alarming graphics, flashing colors, fake virus scan results, and a phone number to call for “immediate technical support.” The pop-up won’t close no matter what you try.
These are fake security alerts designed to trick you into calling scammers. Real antivirus software never works this way. If you encounter this situation, force-quit your browser using Task Manager on Windows or Force Quit on Mac. Don’t call any phone numbers displayed in these pop-ups.
7. Requests for Personal or Financial Information
Legitimate tech support will never ask for your social security number, bank account details, credit card numbers, or passwords during a support call. They already have your account information if you’re a genuine customer contacting them through proper channels.
Scammers fish for this information to commit identity theft or drain your accounts. They might claim they need to “verify your identity” or “process a refund” but these are tactics to extract sensitive data. Real companies have secure systems for handling customer information and won’t request it over the phone or through unsecured channels.

What to Do If You’ve Been Targeted
If you realize you’re speaking with a scammer, hang up immediately. Don’t worry about being rude. If you’ve already granted remote access, disconnect from the internet and run a full antivirus scan from a trusted security program.
Take these additional steps to protect yourself:
- Change all your passwords, especially for email, banking, and social media accounts
- Contact your bank and credit card companies to report potential fraud
- Place a fraud alert on your credit reports through the major credit bureaus
- Report the scam to the FTC at reportfraud.ftc.gov and to your local law enforcement
- If you paid the scammer, contact your financial institution immediately to attempt reversal
- Consider having a professional cybersecurity expert examine your device
Staying Safe in the Wake of Havoc Malware
The recent Havoc malware attacks have created an ideal environment for tech support scammers. Victims of these attacks are understandably anxious about their computer security and more vulnerable to social engineering tactics.
Protect yourself by keeping your operating system and antivirus software updated, being skeptical of unsolicited contact, and verifying the identity of anyone claiming to provide tech support. When in doubt, hang up and contact the company directly using contact information from their official website.
Remember that legitimate tech companies have no way of knowing your computer has a problem unless you tell them first. They don’t call you. You call them. This simple principle can save you from most tech support scams.
Stay vigilant, trust your instincts, and never let anyone pressure you into immediate decisions about your computer security or financial information. Taking a few extra minutes to verify someone’s legitimacy is always worth the effort when your personal security is at stake.