Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Call from Microsoft - the successful scam in analysis!
Offensive Security

Call from Microsoft - the successful scam in analysis!

Receiving a call from Microsoft - Caution Fraudsters! Do not allow criminals to access your computer under any circumstances!

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 7, 2024 3 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

The Microsoft tech support scam tricks victims via fake browser warning banners or phone calls, pressuring them to grant remote access to their computer. Criminals then set a new password to lock out the owner and demand around 400 euros to resolve the alleged problem. Microsoft itself warns that official support never initiates unsolicited calls. If remote access was granted, disconnect the computer from the internet immediately, have it checked by a specialist, and change all passwords.

Table of Contents (3 sections)

Through advertising or manipulated websites, people are tricked into accepting or making a call from Microsoft. With the help of fake warnings, pressure is exerted. The criminals want to gain access to the computer to encrypt data there and then blackmail the victims.

A Microsoft employee calls and warns that your own computer is distributing viruses, Trojans and worms? Nothing can be saved on its own - the alleged Microsoft employee must immediately connect to the computer remotely to prevent further damage and to cushion potential costs.

This or similar is how the scam begins. The victims are addressed in different ways. Usually an advertising banner opens, but it is designed like a warning message. It is often very difficult to click the advertisement away. An advertising blocker can prevent the advertisement from being displayed at that point. But criminals also contact their targeted victims by e-mail. The displayed phone number leads to a wrong Microsoft employee. Source: dieviren.de Especially inexperienced users* panic and call the phone number. The call center employees at the end of the line, who by no means work for or on behalf of Microsoft, are trained to put pressure on them. It is assumed that their own computer is constantly infecting hundreds of computers. Often a medium three-figure sum is demanded, often around 400 EUR. Only then can the alleged Microsoft engineers solve the problem.

Tech Support Scam - Microsoft itself warns about it!

The success of the fraud scam is taking on such proportions that the concern is now issuing a warning itself:

  • Official support requests are made by e-mail
  • A call from alleged Microsoft employees should be terminated directly

Whoever takes these points into account does not fall for the swindlers.

Why is the call from Microsoft so critical?

The problem with the scam is that the scammers connect to the victims' computers. The first action of the criminals is often to set a password, which is requested after rebooting. Since the fraudster is then no longer on the computer, the scam continues. Often the potential victims do not notice anything. When the computer is restarted, the shock occurs. This is how you can protect yourself from the Microsoft scam:

Disconnect your computer from the Internet as soon as possible, have it checked by a specialist and change all passwords

The incidents can be reported on a form provided by Microsoft. In this way, the software company ensures that the mesh is contained. If you would like to know how such a scam works and how professionally the attackers proceed, take a look at the course of the scam: https://www.youtube.com/watch?v=xNskW4RVbQY&t

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV