{"id":53068,"date":"2016-04-16T20:50:12","date_gmt":"2016-04-16T20:50:12","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53068"},"modified":"2016-04-25T14:05:51","modified_gmt":"2016-04-25T14:05:51","slug":"the-anatomy-of-tech-support-scams","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/","title":{"rendered":"The Anatomy of Tech Support Scams"},"content":{"rendered":"<p>Fake tech support companies have been using popups and programs for quite some time with several different justifications to &#8220;fix&#8221; your computer. Here is a breakdown of a typical tech support scams.<\/p>\n<p>&nbsp;<\/p>\n<h2>The Hook<\/h2>\n<p>In order to have the victim call, there must be a method to force the user to call without looking like ransomware. There are two main methods: web browser popups and disruptive applications.<\/p>\n<h4>Browser popups:<\/h4>\n<figure id=\"attachment_53101\" aria-describedby=\"caption-attachment-53101\" style=\"width: 937px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-chrome.png\" rel=\"attachment wp-att-53101\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-53101 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-chrome.png\" alt=\"Fake blue screen inside of Chrome web browser\" width=\"937\" height=\"905\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-chrome.png 937w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-chrome-300x290.png 300w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-chrome-768x742.png 768w\" sizes=\"(max-width: 937px) 100vw, 937px\" \/><\/a><figcaption id=\"caption-attachment-53101\" class=\"wp-caption-text\">Notice the Chrome menu at the top. These popups are the most common due to their ease of deployment.<\/figcaption><\/figure>\n<p>These are the most common method due to the ease of deploying websites to serve the popups. Many of these popups are seen when mistyping website names. When the popups are closed, they are scripted to open again. The easiest solution is to open the task manager(via Ctrl+alt+delete or typing taskmgr) and end the browser process.<\/p>\n<p>&nbsp;<\/p>\n<h4>Programs<\/h4>\n<p>Programs are more difficult for scammers to deploy as they need to be downloaded and executed. These programs can be a little more difficult to close because some of the fullscreen popups try to disable the task manager and block input. Small popup windows can be closed by opening the task manager and finding the offending program which usually stands out.The easiest way to remove the fullscreen window is to know the password which can only be retrieved by calling the scam phone number. Restarting may get rid of the fullscreen popup but some install themselves to startup which means the user will have to boot into safe mode and remove the program.<\/p>\n<figure id=\"attachment_53092\" aria-describedby=\"caption-attachment-53092\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-iconnect.png\" rel=\"attachment wp-att-53092\"><img decoding=\"async\" class=\"wp-image-53092 size-large\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-iconnect-1024x675.png\" alt=\"Fake blue screen program\" width=\"640\" height=\"422\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-iconnect-1024x675.png 1024w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-iconnect-300x198.png 300w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-iconnect-768x506.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/fake-bsod-iconnect.png 1271w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-53092\" class=\"wp-caption-text\">Similar to the one above, this fullscreen window is a program scammers will run on your computer by tricking the user to run it. One such program was named after a popular cleaning tool.<\/figcaption><\/figure>\n<h2>The Diagnosis<\/h2>\n<p>When a scam number is called, they will ask what the error is on the screen. When given, they will tell you one of several problems the computer allegedly has. After that, they will give you a password to close the fullscreen window(if one exists). The \u201ctech support\u201d person will then ask you to download Teamviewer, install it, and give them the connection information. Teamviewer has added a popup warning users about scams and scammers will quickly tell you to allow the connection. After this, they may switch to another remote support application.<\/p>\n<p>The scammer will use one of several different windows to show \u201cviruses\u201d or other issues. One of the easiest methods is to open the Windows Event Viewer and show critical events. These events can range from unexpected power loss to task scheduler issues but will not notify you of malware.<\/p>\n<figure id=\"attachment_53085\" aria-describedby=\"caption-attachment-53085\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/event-viewer-iconnect.png\" rel=\"attachment wp-att-53085\"><img decoding=\"async\" class=\"wp-image-53085 size-large\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/event-viewer-iconnect-1024x537.png\" alt=\"The event viewer window with a critical event due to power loss.\" width=\"640\" height=\"336\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/event-viewer-iconnect-1024x537.png 1024w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/event-viewer-iconnect-300x157.png 300w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/event-viewer-iconnect-768x403.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/event-viewer-iconnect.png 1721w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-53085\" class=\"wp-caption-text\">Event viewer consolidates and allows you to conveniently examine Windows logs. Scammers will claim critical errors and warnings are viruses. This critical error was due to the computer losing power.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Another scam is to claim Windows is no longer activated. The scammer will show that Windows 7 is installed(if it is installed), open a real Microsoft page that states official support for Windows 7 has ended, and then claim the user needs to purchase a new license key. Neither of these are connected. Windows activation checks if the copy of Windows is legitimate. Microsoft Windows&#8217; lifecycle determines when Microsoft will stop providing technical support and updates to a Windows version. Windows 7&#8217;s mainstream support ended in January of last year and scammers are using this to scare users into needlessly purchasing a new(fake) Windows key.<\/p>\n<p>&nbsp;<\/p>\n<h2>The \u201cfix\u201d<\/h2>\n<p>The proposed fix is \u201cremoving the viruses\u201d or installing a Windows license key. Scammers are sparse on details of the procedure. These fixes consist of installing AV software and free cleaners. Free software used is typically the most popular cleaners and malware removers. Antivirus software is free or installed using an illegal key. Command prompt windows with\u00a0 scrolling text is sometimes used to add legitimacy and \u201cmagic\u201d. These fake windows are very low effort that typically consist of listing the contents of the hard drive and changing the color of the command prompt(Think CSI: Cyber or another popular crime show). If anything, the window listing files will hog hard drive time and slow program installation substantially while it runs.<\/p>\n<figure id=\"attachment_53096\" aria-describedby=\"caption-attachment-53096\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-script.png\" rel=\"attachment wp-att-53096\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-53096 size-large\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-script-1024x361.png\" alt=\"Two windows that do nothing useful.\" width=\"640\" height=\"226\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-script-1024x361.png 1024w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-script-300x106.png 300w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-script-768x271.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-script.png 1174w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-53096\" class=\"wp-caption-text\">The command on the left sends a &#8220;ping&#8221; to another computer to see if it exists. 127.0.0.1 is called the local loopback where programs can communicate internally. This internal communication doesn&#8217;t need to answer pings from itself. The window on the right is listing every single file on the hard drive. Neither of these windows show\/do anything useful.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_53107\" aria-describedby=\"caption-attachment-53107\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/avg-key1.png\" rel=\"attachment wp-att-53105\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-53107 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/avg-key1.png\" alt=\"A reused key entered into AVG.\" width=\"760\" height=\"595\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/avg-key1.png 760w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/avg-key1-300x235.png 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><\/a><figcaption id=\"caption-attachment-53107\" class=\"wp-caption-text\">A reused key entered into AVG.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Other software sold is typically pirated and installed with reused keys. One scam company will torrent pirated software from the user\u2019s computer. While very useful, pirated content is often downloaded using torrents due to its decentralized nature.<\/p>\n<figure id=\"attachment_53108\" aria-describedby=\"caption-attachment-53108\" style=\"width: 849px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/vmware.png\" rel=\"attachment wp-att-53108\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-53108 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/vmware.png\" alt=\"Vmware torrent link.\" width=\"849\" height=\"124\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/vmware.png 849w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/vmware-300x44.png 300w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/vmware-768x112.png 768w\" sizes=\"(max-width: 849px) 100vw, 849px\" \/><\/a><figcaption id=\"caption-attachment-53108\" class=\"wp-caption-text\">The VMware link at the bottom(http:\/\/magnet&#8230;.) is called a magnet link. These links tell torrent clients where to find information on the desired file\/s. This information is used to find other computers willing to share the software. The VMware hyperlink links to a pirated VMware Workstation installer.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>This section is a little bit light on content, right? Well there is a reason for that. Most of these services don&#8217;t do much of anything you couldn&#8217;t do yourself with a simple Google search.\u00a0 \ud83d\ude42<\/p>\n<p>&nbsp;<\/p>\n<h2>Payment<\/h2>\n<p>&nbsp;<\/p>\n<p>Most scammers will require you to pay before the \u201crepair\u201d starts. Ones that offer to repair first and pay later will threaten to \u201ctake legal action\u201d if the caller does not pay. Some of the scams use the reputable squareup.com to collect payments.<\/p>\n<figure id=\"attachment_53102\" aria-describedby=\"caption-attachment-53102\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/windows-invoice-.png\" rel=\"attachment wp-att-53102\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-53102\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/windows-invoice--1024x675.png\" alt=\"This is an invoice from a scammer on the reputable Squareup.com\" width=\"640\" height=\"422\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/windows-invoice--1024x675.png 1024w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/windows-invoice--300x198.png 300w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/windows-invoice--768x506.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/windows-invoice-.png 1271w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-53102\" class=\"wp-caption-text\">This is an invoice from a scammer on the reputable Squareup.com<\/figcaption><\/figure>\n<h4>Holding hostage<\/h4>\n<p>If the scammers \u201crepair\u201d a computer before demanding payment, they will use Teamviewer to keep control of the user\u2019s computer. They accomplish this by password protecting Teamviewer so the normal user will not be able to shut it off. Disconnecting the computer from the internet and uninstalling Teamviewer will generally solve the issue. If not, the user can disable the teamviewer service and terminate the Teamviewer processes.<\/p>\n<figure id=\"attachment_53094\" aria-describedby=\"caption-attachment-53094\" style=\"width: 715px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-teamviewer-hostage.png\" rel=\"attachment wp-att-53094\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-53094 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-teamviewer-hostage.png\" alt=\"Here a scammer just placed a password on Teamviewer and enforced admin-only changes.\" width=\"715\" height=\"483\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-teamviewer-hostage.png 715w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/iconnect-teamviewer-hostage-300x203.png 300w\" sizes=\"(max-width: 715px) 100vw, 715px\" \/><\/a><figcaption id=\"caption-attachment-53094\" class=\"wp-caption-text\">Here a scammer just placed a password on Teamviewer, enforced admin-only changes, and prevented it from being shut down.<\/figcaption><\/figure>\n<h2>The Mistake<\/h2>\n<p>When one of the scammers was pretending to fix the computer, he opened a curious webpage. The page showed download links to the different software they sell and keys they reuse. It also linked to a VMware Workstation torrent and uTorrent installer, further confirming their piracy. They linked directly from other websites for large files and used Dropbox for smaller ones. Someone may be able to report them to Dropbox, Squareup, and the software manufacturers to give the scammers a bad day.<\/p>\n<figure id=\"attachment_53114\" aria-describedby=\"caption-attachment-53114\" style=\"width: 768px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/links-page.png\" rel=\"attachment wp-att-53114\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-53114\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/links-page.png\" alt=\"Stolen Software Links\" width=\"768\" height=\"669\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/links-page.png 913w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/links-page-300x261.png 300w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/links-page-768x669.png 768w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><figcaption id=\"caption-attachment-53114\" class=\"wp-caption-text\">Convenient page of incriminating links and keys courtesy of a scam tech support website. \ud83d\ude00<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Fake tech support companies have been using popups and programs for quite some time with several different justifications to &#8220;fix&#8221; your computer. Here is a breakdown of a typical tech support scams. &nbsp; The Hook In order to have the victim call, there must be a method to force the user to call without looking [&hellip;]<\/p>\n","protected":false},"author":68,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4851],"tags":[235,4824],"class_list":["post-53068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-research-team","tag-scams","tag-tech-support-scams"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Anatomy of Tech Support Scams<\/title>\n<meta name=\"description\" content=\"Fake tech support companies have been using popups and programs for quite some time with several different justifications to &quot;fix&quot; your computer. Here is\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Anatomy of Tech Support Scams\" \/>\n<meta property=\"og:description\" content=\"Fake tech support companies have been using popups and programs for quite some time with several different justifications to &quot;fix&quot; your computer. Here is\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-16T20:50:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-04-25T14:05:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PC Matic Malware Research\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Malware Research\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/\"},\"author\":{\"name\":\"PC Matic Malware Research\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f5f9723c200c849e0a641a91c625683c\"},\"headline\":\"The Anatomy of Tech Support Scams\",\"datePublished\":\"2016-04-16T20:50:12+00:00\",\"dateModified\":\"2016-04-25T14:05:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/\"},\"wordCount\":1212,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"scams\",\"tech support scams\"],\"articleSection\":[\"Malware Research Team\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/\",\"name\":\"The Anatomy of Tech Support Scams\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2016-04-16T20:50:12+00:00\",\"dateModified\":\"2016-04-25T14:05:51+00:00\",\"description\":\"Fake tech support companies have been using popups and programs for quite some time with several different justifications to \\\"fix\\\" your computer. Here is\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/the-anatomy-of-tech-support-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Anatomy of Tech Support Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f5f9723c200c849e0a641a91c625683c\",\"name\":\"PC Matic Malware Research\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pc-matic-malware-research\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Anatomy of Tech Support Scams","description":"Fake tech support companies have been using popups and programs for quite some time with several different justifications to \"fix\" your computer. Here is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/","og_locale":"en_US","og_type":"article","og_title":"The Anatomy of Tech Support Scams","og_description":"Fake tech support companies have been using popups and programs for quite some time with several different justifications to \"fix\" your computer. Here is","og_url":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-04-16T20:50:12+00:00","article_modified_time":"2016-04-25T14:05:51+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"PC Matic Malware Research","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Malware Research","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/"},"author":{"name":"PC Matic Malware Research","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f5f9723c200c849e0a641a91c625683c"},"headline":"The Anatomy of Tech Support Scams","datePublished":"2016-04-16T20:50:12+00:00","dateModified":"2016-04-25T14:05:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/"},"wordCount":1212,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["scams","tech support scams"],"articleSection":["Malware Research Team"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/","url":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/","name":"The Anatomy of Tech Support Scams","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2016-04-16T20:50:12+00:00","dateModified":"2016-04-25T14:05:51+00:00","description":"Fake tech support companies have been using popups and programs for quite some time with several different justifications to \"fix\" your computer. Here is","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/the-anatomy-of-tech-support-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Anatomy of Tech Support Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f5f9723c200c849e0a641a91c625683c","name":"PC Matic Malware Research","url":"https:\/\/www.pcmatic.com\/blog\/author\/pc-matic-malware-research\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53068"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53068\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}