No items in your cart
In this scheme; the criminal contacts the victim offering a refund for tech support services previously rendered. The criminal requests access to the victim’s device and instructs the victim to login to their online bank account to process a refund. As a result, the criminal gains control of the victim’s device and bank account. Remember legitimate customer, security, or tech support companies will not initiate unsolicited contact with individuals.