Maintaining control of your computer, tablet, phone, and other electronic devices is essential. With remote access applications growing in popularity, scammers are using this technology to gain access to their victims’ sensitive information.
What are remote access applications?
Remote access applications are software tools that allow someone to gain access and control of your computer. These applications are commonly used to provide online IT support, work remotely and collaborate on projects from different locations. Although, they can be used for fraudulent purposes as well.
How do scammers take control of your computer?
Scammers typically take control of your computer through the use of social engineering. What is social engineering, you ask? It is a manipulation technique where a scammer builds a relationship with their victim and psychologically influences them into sharing personal information or carrying out fraudulent acts. Here are two examples of this:
Example 1: The scammer will contact the victim and build a relationship. This could be done online or over the phone. The scammer will trick the victim into making security mistakes or giving away their private information through this process. This can happen over time or in one instance, leading to the scammer installing a remote access application to the victim’s computer without being detected.
Example 2: Scammers will prey on people who require extra assistance with technology and may not have a deep understanding of common technology issues. They will pose as an IT support worker and offer to fix a computer issue by using a remote access application they get you to download.
Once the scammer has infiltrated your computer through a remote access application, they have access to all of your personal information stored on your computer that is not password protected. Your online banking information, passwords and more can be gathered by the scammer over time and with technology.
How will scammers use this information once they have it?
Once a scammer can access your computer, they could scam you in multiple ways, such as sending fraudulent e-transfers without your knowledge or committing cybercrimes from your IP address. If your online banking is compromised and a scammer has remote access to your computer, they could send an e-transfer from your IP address, which means it would appear to have been sent from your home. In these instances where scammers send funds with your IP address, proving it as fraudulent is challenging as it looks like you sent it yourself. The scammer could also carry out criminal activity from your IP address which would be traced back to you.
What should you do if you suspect you’re being scammed?
Over the phone:
Online (Computer, cell phone, tablet etc)
It is important to remain vigilant and to never trust unknown sources with your personal information. A reputable source will never keep you on the phone for hours and pressure you to download a remote access app, to send them money or share your personal information. It is better to er on the side of caution and be skeptical. Your financial institution can help you verify the validity of requests you receive online and assist you with next steps to ensure your security.
Want to learn more about how to protect yourself from scams? Check out more of our blogs: