Tech Support Scam Interaction

Jul 11, 2024

Lecture Notes: Tech Support Scam Interaction

Overview

  • Experiment: Installed Windows 3.11 on a 28-year-old computer with floppy disks.
  • Objective: To observe scammers' reactions to connecting to an old machine without functioning internet.
  • Tasks: Played Doom, interacted with tech support scammers.

Interaction Highlights

Initial Interaction with Scammer

  • System Used: Windows 3.1 (MS-DOS).
  • Issue Reported: Suspected virus on the computer, unable to find files.
  • Scammer Response: Confusion about the operating system (mistook it for Linux).
  • Initial Diagnosis: Scammer tried to diagnose without proper understanding.

Scammer's Troubleshooting Steps

  • Attempted First Steps: Suggested going to the main menu and using a browser or MS-DOS.
  • Query on Usage: Asked for the purpose of the computer (entertainment, software development).
  • Misunderstandings: Confused between Windows and Linux, did not recognize the interface.

Billing Department Involvement

  • Call Transfer: Mentioned billing department would call back within 5 minutes to issue a refund.
  • Advice: was to update the system.
  • Scammer's Knowledge Gap: Tried getting information on bank details without solving the initial problem.

Continuation of Scam Strategy

  • Phone Query: Asked about phone type (Android, iPhone, Nokia).
  • Bank Details: Asked for Bank of America debit card details.
  • Network Issues Claim: Mentioned online infection and network worm.
  • Solution Offered: Proposed network security installation; needed immediate action.

Scammer's Technical Claims

  • Hackers and Drivers: Claimed hackers removed drivers, affecting the printer.
  • Network Scanning: Used netstat to show foreign IP addresses, claimed these were hackers.
  • Wikipedia Reference: Explained that using netstat is common in scams, accused of faking Wikipedia content.

Realization and Confrontation

  • User's Experiment: Explained using a virtual machine and a 28-year-old system.
  • Scammer's Realization: Continued with script despite clear indications of a setup.
  • Wikipedia Argument: Scammer denied being a scammer, tried discrediting the source.
  • Final Confrontation: User challenged scammer's knowledge and ethical stance.

Conclusion

  • Outcome: Scammer failed to solve the problem, exposed as fraudulent.
  • User's Intent: Highlighting typical tech support scam methods, educating viewers.
  • Scammer's Reaction: Defensive, ultimately disconnected.

Key Takeaways

  • Scam Techniques: Use of misinformation about systems, fake technical solutions, phishing for personal details.
  • User Education: Importance of understanding scams, not sharing personal or financial information without verification.