Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Microsoft Tech Support Scams: Why They Thrive
Oldest First  |  Newest First  |  Threaded View
Tom LaSusa
Tom LaSusa,
User Rank: Apprentice
5/13/2013 | 4:35:07 PM
re: Microsoft Tech Support Scams: Why They Thrive
The real reason why they thrive? Lack of education/passing this information along to family and friends. That's the bottom line. And it doesn't take a whole lot either -- instead of posting yet another silly meme on your Facebook profile, post a notice reminding friends and family to hang up when they get these calls.
User Rank: Strategist
5/14/2013 | 6:26:58 PM
re: Microsoft Tech Support Scams: Why They Thrive
Is anyone surprised? Most computer users probably shouldn't be allowed near a computer, much less trusted to take the rudimentary steps needed to protect said computer. Until training/schooling focuses on security from day one scamming and the like will remain a major problem.
Number 6
Number 6,
User Rank: Apprentice
5/15/2013 | 3:00:48 PM
re: Microsoft Tech Support Scams: Why They Thrive
I actually enjoyed getting the telephone scam call a couple months ago. I told the woman who called (Indian accent) that I needed to know the IP address of the PC with the problem, since I have several and she wanted me to go to a URL from that PC. She didn't know what an IP address was, let alone the difference between IPv4 and IPv6. I asked for a phone number that I could call her back at, and got one that I found out later was for a florist in Wisconsin!

After continuing to get nowhere with my IP question, I asked if I could talk with someone who could help. I got her "supervisor," told him that I work in IT, and he tried to convince me that I don't know how networking works. Um, yeah, good luck with that. I was probably coding network software before he was running his first scam. I finally hung up on him, but I regret not getting that URL.

Sounded like a boiler room operation, not an individual.

I agree with Tom. The call was the first time I'd heard about this particular scam. Lots of people could fall for this.
User Rank: Apprentice
5/15/2013 | 6:05:06 PM
re: Microsoft Tech Support Scams: Why They Thrive
I got one of these a couple of weeks ago. "I am calling about problem with operating system of, Microsoft Windows, blah, blah, blah" something like that. I just hung up, maybe next time if I have time and feel like it I'll play them like Number 6 did.
Andrew Hornback
Andrew Hornback,
User Rank: Apprentice
5/17/2013 | 1:59:17 AM
re: Microsoft Tech Support Scams: Why They Thrive
Let me be the first to say it... Thank you Steve Case.

Without the explosive popularity of America OnLine and the massive expansion of the Internet in the 90s, I highly doubt that this would be an issue at this point. Remembering the days when the Internet was a utopia of thinkers, students, educators, defense contractors and technically savvy people - a very small percentage of those people would fall for this sort of social engineering.

But, since we've got Ma and Pa Kettle bringing home a brand new PC from their closest big box store and hooking it up to that "new fangled" Internet, you'll have people taking advantage of those who are less savvy.

Something to keep in mind here - how much of a role does the media play in feeding into this monster? Remember Nimda and CodeRed and all of those virii from days gone by? The entire world was made to be extremely afraid of virii - possible considering them to be even worse than a virulent strain of H1N1... because they don't really grasp the idea of a computer virus and what it really does, while everyone knows that H1N1 gives you physical symptoms of an infection.

That said, why isn't there more of an effort to educate people, BEFORE they become a victim of this sort of thing? Ounce of prevention being worth a pound (or dollar) of cure, and all...

Andrew Hornback
InformationWeek Contributor
User Rank: Apprentice
12/3/2014 | 10:40:15 AM
MicroSoft Fraud
Recieved last night a phone call from MicroSoft that my computer had some problems and He has called to fix them.  I thought it was a Scam so I played on a little while, knowing that I did not have a problem with my MicroSoft because I do Not have Microsoft. 

Their telephone number is 348-975-6987 they called me @ 7:06 P.M. Tuesday the 2nd, Wanting me to turn on my computer and he would fix things for me..  No Thanks I told him he was a Scam and he hung up.

Micro Soft should be able to stop this someway. I do not know what the outcome would be but I did not want to find out.

Can you give me any feedback ?    [email protected]
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
12/3/2014 | 10:57:06 AM
Re: MicroSoft Fraud
You were wise not to fall victim to that vishing scam, @WilburD802. But you are in the minority. Here's some data from a recent Dark Reading poll on the subject of social engineering tactics like this one...
User Rank: Apprentice
12/30/2014 | 6:26:53 PM
Re: MicroSoft Fraud
I do not believe that Microsoft can legally monitor/trace phone calls, review credit charges, and trace the money trail to catch these cyber criminals.  The federal governament does, and with the billions scammed with these fraud cases, some people might think it would be a good idea.  (Just dont know if any of those poeple are in the current administration)


Here is one possible scenerio,  (I just got off the phone with a scammer by the way).  These guys have call centers; huge operations making money hand over foot.

They also have a consistent process, making it real easy to catch.

 When a call is received by a scammer, (I knew it was a scammer),  you go to a webpage while the scammer is on the phone and enter the phone number on which the call is recieved and details about the operation.

The phone could be traced real time; the web site could provide a credit card number specifically designed to be traced.  You give this credit card number to the fraudulent person.  Then put in the ach request and the destination account would simply be identified; the phone conversation recorded an the fraud halted.  Additionally the account could then be reviewed and the charges reversed for like transactions.

Not sure what the motivation for not doing this is.  Must be some motive.


 This is a very low tech means.  In reallity this could be done in an automated fasion.  The keywords "From Microsoft" could be scanned real time like other key phrases, that trigger a person to monitor and prevent the fraud, and stop the losses.  If there was a privacy concern the technology could speak to the scammee, without the scammer hearing to allow the call to be monitored; thereby catching the criminal.  I beleive the law provides for a non-citizen to be monitored during a criminal act;  the monitoring would occur only after technology identifies the call is part of a  criminal act.


User Rank: Apprentice
9/10/2016 | 1:30:24 PM
Scam alive and well!
I just got a call and a gentleman with an Indian accent told me he was the tech that worked on my PC (I just got a new PC) and my Windows PC was not updating and they were going to enable this.  I played along and they asked me to go to www.startcontrol.com (he even 'guessed' that I was a Chrome user).  I told him my PC rebooted and looked it up online and found some SCAM info, but not a lot.  As I played along they told me to enter a code, I didn't have one so they gave me one, told me to enter it in the box and hit the inocuous gray 'download' button. He was smooth.  I can see people falling for this and actually downloading terribly malicious software onto their PCs.  No one you don't know should tell you download something onto your PC.  This is just the phone version of an email hoax with a virus or worm attached except they are talking you through the download!  HANG UP! 
User Rank: Apprentice
1/17/2017 | 12:25:39 PM
Thank You!!!!!
Thank you!!! Just had a call desribing the exact steps listed here on the startcontrol scam. Before I hit download I told them to hold, googled startcontrol.com scam and this popped up. Thank you for this service. James

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-10-03
pfSense v2.5.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the browser.php component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a file name.
PUBLISHED: 2022-10-03
phpipam v1.5.0 was discovered to contain a header injection vulnerability via the component /admin/subnets/ripe-query.php.
PUBLISHED: 2022-10-03
Under certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage this vulnerability to escalate privileges and execute arbitrary code.
PUBLISHED: 2022-10-03
An issue was discovered in Veritas NetBackup through 8.2 and related Veritas products. An attacker with local access can send a crafted packet to pbx_exchange during registration and cause a NULL pointer exception, effectively crashing the pbx_exchange process.
PUBLISHED: 2022-10-03
An issue was discovered in Veritas NetBackup through and related Veritas products. The NetBackup Primary server is vulnerable to an XML External Entity (XXE) Injection attack through the DiscoveryService service.