Once again, scammers are upping their game. It typically starts as someone contacting you to solve a technology problem that you may not even know you had and offering assistance that (in the end) you may not even need. They start by requesting remote access to your computer to determine what the problem is, and that is when the trouble can start.
Below is an outline of things that can happen when a scammer gains access to a computer:
- You may be asked to purchase software or a fix. They will request your credit card information.
- Software may be installed that is hidden from the user and not authorized by you.
- Screen scrapers (software that records and transmits what is displayed on your screen) and key loggers (software that records and transmits what you type) may be used to help them gain credentials (user names and passwords). At this point they could get access to everything to which you have access.
- If they are able to get a password to online banking, scammers may attempt to transfer a small amount of money between accounts to see if it works before attempting “transfer to any account” and draining all available. These test transfers are usually for a $1 or less. Since the scammers have access to email accounts on that computer, they can receive your email verification code to complete the transaction.
Here are some things you can do to protect your accounts:
- Set up an online banking alert to message you for any of the following:
- Unauthorized Change in your Contact Info
- Login Credential Change
- Unauthorized Password change or Reset Request
- Keep an eye on your account for small transfers that you did not originate.
- Avoid setting up an automatic login to accounts.
- Only allow computer updates and fixes from verified sources.
- Never give credit card or personal information to someone who calls you. It’s best if you look up the support number or verify their contact information. Be cautious if they will not allow you to contact them.