Tech Support Scams

That virus warning is the actual attack.

What You'll Learn in Tech Support Scams

Tech Support Scams Training Steps

  1. A Busy Quarter-End

    It's Thursday afternoon at Cloudbridge Analytics. You are Alice, a data analyst working on the Q1 performance report for a major client. The deadline is tomorrow and you still need to cross-reference some statistical benchmarks. You decide to look up some industry data on a reference site you've used before.

  2. Browsing for Data

    Alice opens StatReference, a statistics resource site she's used many times. While scanning the page for relevant datasets, a small notification pops up in the corner of the screen. It looks like a Windows system alert - complete with a shield icon and urgent red text.

  3. The "Virus Alert"

    The browser redirects to a terrifying full-screen warning page. Flashing red borders, a Windows Defender logo, and 'CRITICAL THREAT DETECTED' in massive text. The page lists several active threats and claims Alice's personal data is at risk of being stolen. A phone number is displayed prominently: 1-888-330-4127 - 'Call Microsoft Certified Support Immediately.'

  4. Calling for Help

    Alice's heart is racing. Her client report contains sensitive financial data - if her computer is truly infected, the client's data could be compromised. With the deadline looming and fear clouding her judgment, she grabs her phone and dials the number from the warning.

  5. "Microsoft Certified Support"

    Someone picks up after a single ring. He introduces himself as Ryan, a certified technician, and immediately claims Alice's computer has been flagged with critical threats. His tone is calm, professional, and reassuring.

  6. The Remote Access Pitch

    Ryan escalates the urgency, claiming Alice's system needs an immediate remote diagnostic. He directs her to download a specific tool so he can analyze the threats remotely.

  7. Downloading the Tool

    Alice opens the URL Ryan provided. The page looks professional - a shield logo, 'Microsoft Certified' badges, and a prominent download button for 'SecureAssist Pro.'

  8. Running the Installer

    The download completes quickly. Alice opens her file manager and double-clicks the file to install it, eager to get the 'diagnostic' running so Ryan can fix the problem.

  9. The Antivirus Warning

    The moment Alice runs the file, her antivirus software springs into action. A red alert appears: the file contains a Remote Access Trojan. Ryan, still on the line, quickly tells Alice to dismiss the warning. He claims the existing virus is interfering with her security software and causing false alerts.

  10. Overriding Protection

    Ryan sounds so confident that Alice begins to doubt her own antivirus. Against her instincts, she decides to dismiss the warning and let the 'technician' proceed.