Information Security

Tech Support Scams: Can I Troubleshoot That for You?

Hackers are crafty. One tactic hackers often use is to impersonate tech support or an organization’s Information Technology department. Over the past year, the Federal Trade Commission has announced 29 law enforcement actions against tech scammers through Operation Tech Trap. 1

Hackers won’t shy away from contacting you the old-fashioned way — by giving you a ring on your phone. Such was the case with the infamous “Microsoft Scam.” In this scheme, hackers called unsuspecting users, informed them that Microsoft specialists detected a virus on their computer, and offered virus removal services. Then, hackers remotely took control of the users’ computers or convinced them to purchase bogus software — all a ploy to obtain credit card information, social security numbers, and passwords. 2

To appear trustworthy to unsuspecting users, hackers can make any number appear on your caller ID. 3 Alternatively, hackers may send an email claiming that you need to update your software or deploy a pop-up alert indicating your computer is infected. Hackers may then ask you to:

n Call the number they offer and provide personal information.

n Install software on your computer (that is actually malware).

n Allow remote access to your computer to “troubleshoot” the issue.

n Pay a fee for services rendered.

To avoid tech support scams, always verify your contact before providing any personal information, clicking on any links, or opening any attachments. Use the Better Business Bureau as a helpful resource to look up company information at bbb.org.

If you suspect your USPS® device has been compromised, report it to the CyberSecurity Operations Center (CSOC) at cybersafe@usps.gov.

For more information on cybersecurity best practices, visit the public-facing CyberSafe at USPS® website at uspscybersafe.com or the CyberSafe at USPS pages on Blue (blue.usps.gov/cyber/) and LiteBlue (liteblue.usps.gov/cyber/).