Last Updated on by SCARS Editorial Team

SCARSSCARS SCARS - Society of Citizens Against Relationship Scams Inc. A government registered crime victims' assistance & crime prevention nonprofit organization based in Miami, Florida, U.S.A. SCARS supports the victims of scams worldwide and through its partners in more than 60 countries around the world. Incorporated in 2015, its team has 30 years of continuous experience educating and supporting scam victims. Visit www.AgainstScams.org to learn more about SCARS.™ Guide: Avoid Microsoft® Tech Support ScamsTech Support Scams Phone scammers may masquerade as tech support employees for a major company in order to take your money or install a virus on your computer. They may call from what seem to be legitimate company numbers using caller ID spoofing.

Protect Yourself From Tech Support Scams

Courtesy of Microsoft®

Tech support scams are an industry-wide issue where scammers use scare tactics to trick you into paying for unnecessary technical support services that supposedly fix the contrived device, platform, or software problems.

How Tech Support Scams Work

Scammers may call you directly on your phone and pretend to be representatives of a software company. They might even spoof the caller ID so that it displays a legitimate support phone number from a trusted company. They can then ask you to install applicationsApplications Applications or Apps An application (software), commonly referred to as an ‘app’ is a program on a computer, tablet, mobile phone or device. Apps are designed for specific tasks, including checking the weather, accessing the internet, looking at photos, playing media, mobile banking, etc. Many apps can access the internet if needed and can be downloaded (used) either for a price or for free. Apps are a major point of vulnerability on all devices. Some are designed to be malicious, such as logging keystrokes or activity, and others can even transport malware. Always be careful about any app you are thinking about installing. that give them remote access to your device. Using remote access, these experienced scammers can misrepresent normal system output as signs of problems.

Scammers might also initiate contact by displaying fake error messages on websites you visit, displaying support numbers and enticing you to call. They can also put your browser on full screen and display pop-up messages that won’t go away, essentially locking your browser. These fake error messages aim to trick you into calling an indicated technical support hotline. Note that Microsoft error and warning messages never include phone numbers.

When you engage with the scammers, they can offer fake solutions for your “problems” and ask for payment in the form of a one-time fee or subscription to a purported support service.

How to protect against tech support scams

First, be sure to follow these tips on how to keep your computer secure »

It is also important to keep the following in mind:

  • Microsoft does not send unsolicited email messages or make unsolicited phone calls to request personal or financial information, or to provide technical support to fix your computer.
  • Any communication with Microsoft has to be initiated by you.
  • If a notification appears with a phone number, don’t call the number. Error and warning messages from Microsoft never include a phone number.
  • Download software only from official Microsoft partner websites or the Microsoft Store. Be wary of downloading software from third-party sites, as some of them might have been modified without the author’s knowledge to bundle support scamScam A Scam is a confidence trick - a crime -  is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. malwareMalware Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts. and other threats.
  • Microsoft recommends that you use Microsoft Edge » when browsing the internet. It blocks known support scam sites using Windows Defender SmartScreen (which is also used by Internet Explorer). Furthermore, Microsoft
  • Edge can stop pop-up dialog loops used by these sites.
  • Turn on Windows Security real-time antivirus protection » in Windows 10. It detects and removes known support scam malware.

Popular Scam Types

There are several forms of tech support scams, all of which aim to trick you into believing that your computer needs to be fixed and you need to pay for technical support services.

Phone ScamsScams A Scam is a confidence trick - a crime -  is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost.

In this type of scam, scammers call you and claim to be from the tech support team of Microsoft or other vendors. They then offer to help solve your computer problems.

Scammers often use publicly available phone directories, so they might know your name and other personal information when they call you. They might even guess what operating system you’re using.

Once they’ve gained your trust, they might ask for your username and password or ask you to go to a legitimate website to install software that will let them access your computer to fix it. If you install the software and provide credentials, your computer and your personal information are vulnerable.

Although law enforcement can trace phone numbers, perpetrators often use pay phones, disposable cellular phones, or stolen cellular phone numbers. Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

If you receive an unsolicited call from someone claiming to be from Microsoft Support, hang up. We do not make these kinds of calls.

 Web Scams

Tech support scamTech Support Scam Phone scammers may masquerade as tech support employees for a major company in order to take your money or install a virus on your computer. They may call from what seem to be legitimate company numbers using caller ID spoofing. websites make you believe that you have a problem with your PC. You may be redirected to these websites automatically by malicious ads found in dubious sites, such as download locations for fake installers and pirated media.

These websites can use any of the following tactics to convince you that there is a problem with your PC that needs fixing:

  • A fake blue-screen error
  • A fake Windows activation dialog box
  • Various fake system errors
  • Supposed malware infection or malicious activity

They can also use the following techniques to further make their claim believable:

  • Put the image or your browser on full screen, making the error appear as though it’s coming from Windows instead of the webpage
  • Disable Task Manager
  • Continuously display pop-up windows
  • Play audio message

All these techniques are meant to persuade you to call the specified tech support number. In contrast, the real error messages in Windows 10 don’t ask you to call a tech support number.

Other forms of support scamsSome tech support scams may also come in the form of malware. When run, these malware may display fake error notifications about your computer or software, similar to tech support scam websites. However, because they are programs that are installed on your computer, scammers will likely use them to perform other malicious actions, such as to steal data or install other malware.

Scammers may also use other ways to reach you, such as email or chat. These email or chat messages may resemble phishing emails; however, instead of pointing to phishing sites designed to steal credentials, the links lead to tech support scam websites.

What To Do If A Tech Support ScammerScammer A Scammer or Fraudster is someone that engages in deception to obtain money or achieve another objective. They are criminals that attempt to deceive a victim into sending more or performing some other activity that benefits the scammer. Already Has Your Info

  • Uninstall applications that scammers have asked you to install. If you have given scammers access, consider resetting your device. To learn how see Recovery options in Windows 10 »
  • Run a full scan with Windows Security to remove any malware. Apply all security updates as soon as they are available.
  • Change your passwords.
  • Call your credit card provider to reverse the charges if you have already paid.
  • Monitor login activity. Use Windows Defender Firewall to blockBlock Blocking is a technical action usually on social media or messaging platforms that restricts or bans another profile from seeing or communicating with your profile. To block someone on social media, you can usually go to their profile and select it from a list of options - often labeled or identified with three dots ••• traffic to services that you would not normally access.

Reporting Tech Support Scams

Tech Support scams are a different animal than Romance Scams yet they can affect the same people!

Help Microsoft stop scammers, whether they claim to be from Microsoft or from another tech company, by reporting tech support scams:

www.microsoft.com/reportascam »

To report an unsafe website directly to Microsoft, fill out a Report an unsafe site form. You can also report unsafe websites in Microsoft Edge by selecting “Settings and More  > Help and Feedback > Send feedback ” when you encounter something suspicious.

You can also report Tech Support Scams to the FBIFBI FBI - Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, the FBI is also a member of the U.S. Intelligence Community and reports to both the Attorney General and the Director of National Intelligence. A leading U.S. counter-terrorism, counterintelligence, and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes, including financial fraud. at www.IC3.gov »

TECH SUPPORT SCAM REFERENCE SECTION

To View This On Your Phone Turn It Sideways

List Of Common Web Support Scams

The following show screen capture images and the text that typically accompanies these and is displayed. The text contains the usual Scammer GrammarScammer Grammar Scammer Grammar (a term invented by the SCARS Team back in 2012) - is a writing style that is largely very bad English, bad grammar, mixed with West African slang and speech patterns. It is hard to define but easy to recognize when you see it. It is often referred to as Pidgin English, though this is not technically true. This most often shows when individual scammers (even if educated) try to improvise and create new written communications. Do a search on our website for SCAMMER GRAMMAR to find countless examples. – we promise that we know how to write properly!

Apple Care Scam
CONTACT APPLE CARE

*YOUR APPLE DEVICE HAS A VIRUSVirus A computer program that can replicate itself and spread from computer to computer or file to file. It comes to life only when you take a specific action, such as running a particular program.* Apple IOS Alert!! PEGASUS (SPYWARESpyware A type of malware installed on computers or cellphones to track your actions and/or collect information without your knowledge. Some spyware can change computer settings for pharming redirection.) ACTIVATED

System might be infected due to unexpected error! Suspicious Activity Detected. Your Browser might be compromised. Possible network damages if virus not removed immediately

Spectrum Critical Alert scam.
Critical Alert!

Malicious Spyware/Riskware Detected Error # 0x86672ee7

Please call us immediately. Do not ignore this critical alert. To secure data and Windows System, click here…

This program has already been blocked. Please call us immediately.

Windows Firewall Security Alert

Windows Firewall Security Alert

Firewall Alert

System Info: Operating System Windows, Browser Under Attack, IP AddressGeolocation Geolocation is the utilization of a device IP address, along with other device signals, to determine geographical location. An Internet Protocol address (IP address) is a numerical label such as 192.0.2.1 that is connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing. An IP Address can be used to locate a physical computer's location. Under Attack, Location Under Attack, Threat Leval Very High

Bad Rabbit scam

BAD RABBIT

Windows Has Detected a BAD RABBIT ATTACK!! On Your System

Facebook Login, Credit Card Details, Email Account Login, Photos stored on this computer

You must contact us immediately so that our engineers can walk you through the removal process over the phone

Bad Rabbit attacl

Windows Has Detected a BAD RABBIT ATTACK !! On Your System

Do Not Shutdown Or Restart Your Computer

Contact Windows Certified Technicans For Immediate Assistance

We're Here To Help scam
We’re here to help.

Contact Support

Your Browser Is Not Safe scam
Your browser is not safe

Attackers might be trying to steal your information from www.computerdata.com. NET::ERR_CERT_DATE_INVALID

www.computerdata.com normally users encryption to protect your information. When Chromium tried to connnect this time, the website sent back unusual and incorrect credentials. This may happen when an attacker is trying to pretend to be www.computerdata.com, or a Wi-Fi sign-in screen has interrupted the connection before any data was exchanged, Hackers attacked from overseas countries.

Your Computer Has Been Locked scam
YOUR COMPUTER HAS BEEN LOCKED!

Your computer has been locked due to violation of the cybersecurity Act of 2016 (SCA 2016, A. 2077) of the United States of America. The computer lock is aimed to stop your illegal activity.

Enter Your Activation Key Here. Unlock. CS Cyber Security

Screen shot of a support scam.
Your device is under threat.

Turn on Real-time protection?

The server runnewdirectory.info is asking for your user name and password. The server reports that it is from Suspicious activity detected on your IP address due to harmful virus installed in your computer. Your data is at a serious risk. There is a system file missue due to some harmfull virus Debug malware error, system failure.

Screen shot of a support scam.
Microsoft WARNING!

The adult website you have visited in the last 24 hours is infected with TrojanTrojan Software that's hidden within apparently harmless data — or masquerades as a regular program — and when activated, can deliver such blows as corrupting data on your hard drive or sending files and account information to hackers. Unlike viruses and worms, Trojans do not self-replicate and spread to other computers. Cerber2.downloader. It is a self-replicating virus which can block your personal files.

Click on “Report To Microsoft” to let us know about this issue

Screen shot of the Microsoft Azure scam.
Microsoft Azure

Votre systeme de securite a detecte des activitees ‘Suspectes’ sur votre ordinateur

Screen shot of a support scam.
Windows Product Key Failure!!!

Windows Defender Prevented an unrecognized and malicious software on your Computer. Please Enter your Windows Product Key.

Invalid Product Key Detected. Your Windows is blocked for security reasons. To unlock Call Microsoft Technical Support

Screen shot of the AppleCare support scam.
AppleCare and warranty

Internet Security Damaged!!! Call Help Desk

Suspicious activity detected on your IP address due to harmful virus installed in your computer. This virus can also damage the firewall secuirty which can result in data loss or hard drive crash

Screen shot of the McAfee support scam.
Threats Detected McAfee Security Online Scan

Adware.DealPly has been detected. Contact Support

SYSTEM CRITICALLY INFECTED! CONTACT SUPPORT IMMEDIATELY

DO NOT TRY TO MANUALLY REMOVE THE VIRUS, HARD-DRIVE MIGHT FAIL*

Screen shot of the Avast support scam.
Threats Detected Avast! Online Scan

Adware.DealPly has been detected. Contact Support

SYSTEM CRITICALLY INFECTED! CONTACT SUPPORT IMMEDIATELY.

Avast Antivirus alert

Screen shot of the Norton by Symantec scam,
Threats Detected Norton by Symantec Online Scan

Adware.DealPly has been detected. Contact Support

SYSTEM CRITICALLY INFECTED! CONTACT SUPPORT IMMEDIATELY. NORTON TECHNICAL SUPPORT

DO NOT TRY TO MANUALLY REMOVE THE VIRUS, HARD-DRIVE MIGHT FAIL*

Screen shot of a fake hacking support scam.
Hacking…

Hacking computer data files… unkown time remaining

Call for support

Screen shot of a fake spyware support scam.
Warning! Spyware detected on your computer! 41 threats found!!!

W32/Adware.Virtumonde, Win32/PrivacyRemover.64 detected on your computer. Danger!

Harmful software (malware) or tracking cookies have been detected during the last scan. It is highly recommended to remove it from your computer.

Screen shot of a tech support scam.
Your connection is not private

Attackers might be trying to steal your information from www.computerdata.com. NET::ERR_CERT_DATE_INVALID

Network Hacked. Network Security Alert. IP Address: 142.124.784.12 Status: Hacked

Screen shot of a tech support scam.
RansomwareRansomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies that are used for the ransoms, making tracing and prosecuting the perpetrators difficult. Ransomware attacks are typically carried out using a Trojan virus disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the WannaCry worm, traveled automatically between computers without user interaction. Detected

Object: Error #268D3 (Unauthorised access); Region: Russia, Chaina, Vietnam

Compromised Information: 1) Facebook Login 2) Credit Card Details 3) Email Account Login; Action: Do Not Shut down or Reset Your Computer, Call Security Expert, Scan Your Device and Network Now.

Screen shot of a Facebook tech support scam.
We noticed your Facebook account is currently logged in

If you have not authorized this log in, your Facebook account may have been compromised due to a malicious virus. We strongly suggest you call our Certified Windows Technicians Toll-free

Screen shot of a tech support scam.
Application.exe has stopped working

Windows can check online for a solution to the problem.

View problem details. Call Toll Free Number.

Screen shot of a tech support scam.
AMY (Microsoft Technician)

I’m Amy from Microsoft. Don’t panic, we know you are not at fault. Please call us now to get this removed. Reference Code 21938

Screen shot of a tech support scam.
Action Required Threats Detected

Asware.DomaIQ has been detected. Ws.Toria.G has been detected. Ws.Security.3 has been deleted.

System is critically infected! Contact support immediately.

Screen shot of a tech support scam.
Microsoft Security Alert!

Firewall detecting ‘suspicious’ incoming network connections, we recomment that you click on “Back to Safety”

Screen shot of a tech support scam.
Windows 10 Pro Update. Failed Error 10xE0008c

Windows 10 Setup. What needs your attention.

This device isn’t compatible in Windows 10. Contact the manufacturer for more info.

Screen shot of a tech support scam.
WARNING! The Website you may have recently visited have downloaded the Malware and Virus on your Windows system.

Contract Microsoft Windows Help Desk For Immediate Support and resolve this issue at Toll Free Number.

Click on Report to Microsoft to let us know about this issue.

Screen shot of a tech support scam.
Your System is under risk

Helpline Number (Toll free)

Microsoft Security Essentials

Screen shot of a tech support scam.
support.apple.com says: ** Apple Warning Alert **

Malicious Pornographic Spyware/Riskware Detected

Error # 0x800

Screen shot of a tech support scam.
Malware Alert! Your device access is disabled to prevent damages.

Windows Security Essentials have Detected Security Issue With This PC. Hacking attempts using VPNVPN A VPN (also known as a proxy) is an app or connection method that keeps your internet connection private, whether you're connecting to unsafe public Wi-Fi or your network at home. Having a layer of security that blocks people from watching you browse helps keep you safe online, no matter where you connect from. Virtual private networks protect you by creating an encrypted "tunnel" that all of your device's data travels through on its way to the internet via a proxy server or service. Encryption turns words and data, like text files, into a secret code. If someone tries to read encrypted data without the password, they'll see random gibberish. servers hiding entities by using this Machine Access.

Firewall Security Alert!

Screen shot of a tech support scam.
Please Call Support for Windows 10

Microsoft Case ID

174.138.39.110 Chrome Windows 10 POSSIBLE ERRORS

Screen shot of a tech support scam.
Microsoft Corporate HAS BLOCKED YOUR PC.**

Error # 268D3

Please call Microsoft immediately

Screen shot of a tech support scam.
WARNING! Mac OS X is infected with Viruses and other malicious applications.

Viruses must be removed and system damage repaired. It is necessary to run the Virus removal procedure immediately, please proceed.

**If you leave this site your Mac OS X will remain damaged and vulnerable** Call apple support

Screen shot of a tech support scam.
Firewall deteting ‘suspicious’ incoming network connections, we recomment that you click on “Back to Safety”

Your computer has been Locked

Your computer with the IP address 182.74.27.50 has been infected by the Trojans — Because System Activation KEY has expired and Your information have been stolen. Call the Google Help Desk to protect your files and identity.

Screen shot of a tech support scam.
PLEASE NOTE: Multiple settings on your browser and Computer may not be properly Configured which may result in poor internet browsering performance, excessive advertisements, and a slow Computer, especially at startup. This could be because of outdated software creating security vulnerabilities.

Call technicall support new so we can HELP FIX YOUR COMPUTER. RECOMMENDED call immediately toll free support. Support agents are currently AVAILABLE.

Your System information: Popup ads ENABLED. Frequently Asked Questions Do you offer support for my computer: YES! Your computer and the operating system are supported. What should I do now? If popup ads are Enabled on your computer and you should call immediately. Enter your computer ID 4532.

Screen shot of a tech support scam.
Microsoft Edge Critical ERROR

There was a dangerous try to get an access to your personal logins and bank information. Luckily, your Firewall managed to block this suspicious connection. We recommend you to freezeFreeze Trauma Freeze Response: While fight-or-flight is the better-known way humans respond to certain stressful stimuli, the additional less known third response "FREEZE", was not as widely studied until this last decade. Freezing as a response to a threat might seem effective, a sort of “playing dead” in the face of danger; however, in humans freezing manifests as an inability to communicate, react, make decisions, or take any action of self-preservation or defense. your accounts until some measures will be taken.

Trojan Virus may have already hurt your hard disk and its data. Your urgent response is needed. Call Help Desk.

Screen shot of a tech support scam.
Windows Security Alert DRIVER IRQL NOT LESS OR EQUAL: BFEBFBFF0031246V

If this is first time you’ve seen this screen, contact windows technician. The problem seems to be caused by the following file: SPCMDCON.SYS

PAGE FAULT IN NONPAGED AREA

Screen shot of a tech support scam.
Unauthorized Access Detected!

Your computer has been infected by the PORN VIRUS RDN/YahLover.wormWorm Like a virus, it can replicate itself and spread — but without any action by you.!055BCCAC9FEC Because System Has An Unauthorized Access

WARNING! Your Windows has been blocked due to suspicious activity!

Please call Microsoft Immediately. A Porn Virus has been detected by firewall.

Screen shot of a tech support scam.
Warning: Internet Security Breached!!

Illegal Porn activities have been found on your PC! Your PC has been Locked for IP protocol Violation and Cybersecurity violation. However, Your Accounts May have been Suspended Until You Take an Action. Your Personal Information seems to have Been Leaked. Call the INternet Security support Team immediately to Unlock your Computer.

Warning Possible damange if not removed immediately. ERROR CODE: MSHACK#17PX

Screen shot of a tech support scam.
FATAL Error

CheckDisallowAllocation. Allocating memory when it not allowed to allocate memory T.E.C. Not Detected

FATAL ERROR: Out of memory for allocation, couldn’t free any thing else

Screen shot of a tech support scam.
This Build of Windows Platform is Expired Today

If it Expires, Your Windows Platform System will be locked or it will be restart in every few minutes

Screen shot of a tech support scam.
Windows Defender Alert: Zeus Virus Detected in Your Computer !!

Internet Security Alert! Code: 055BCCAC9FEC

Please Do Not Shut Down or Reset Your Computer. The following data will be compromised if you continue: 1. Passwords, 2. Browser History, 3. Credit Card Information, 4. Local Hard Disk Files. Call Microsoft Technical Department

Screen shot of a tech support scam.
Windows Security Essentials have Detected Security Issue With This PC

Windows Activation Issue Has Been Detected On this Computer Please Call Support

Windows Firewall Has Detected Security Breach from this IP Address. This IP Has Been used for illegal Activity. Your Windows Will Stop Working in 24 Hours

Screen shot of a tech support scam.
Warning – Your IP address has been blocked from accessing this website for security reasons.

You may be a victim of online identity theftIdentity Theft Identity theft is when someone uses another person's personal identifying information, without their permission, to commit fraud or other crimes. In both the U.K. and the United States it is the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.. The Spyware/Adware present on some device at your network location may have compromised your network security. An online ID theft can be intended to steal.

IMPORTANT ALERT. WARNING. Hard Drive Safety Delete Starting in 5:05 minutes. Attention customer: Your personal emails and other personal passwords as well as credit card information are at risk.

Screen shot of a tech support scam.
Your Computer Is heavily damaged by ( 4 ) virus!

We detect that you is 28.1% DAMAGED because of four harmful viruses from recent adult sites. Soon it will damage your system files and will corrupt your contacts, photos, data, applications, and expose personal data, etc.

If you do not remove the virus now, it will cause severe damage system files and expose personal data.

Screen shot of a tech support scam.
Your computer has been Locked.

Your computer with the IP address has been infected by the Virus. Because System Activation KEY has expired and Your information have been stolen.

Hard Drive is not accepted. The file or directory is corrupted and unreadable! Please call Support Now! To find the right solution.

Screen shot of a tech support scam.
WARNING! The website you may have recently visited have downloaded the Malware and Virus on your Windows 10 system. Contact Microsoft Windows 10 Help Desk for Immediate Support and resolve this issue.

1. Microsoft Windows 10 detected major Malware and Virus Download from the Internet. DO NOT TRY TO CLOSE THIS PAGE. 2. Your Personel Information like Login User Name, Password, and Banking Details are may not be SAFE. 3. Contact Microsoft Help Desk Immediately to prevent Data Theft on your Windows 10 system.

Screen shot of a tech support scam.
Windows Defender Alert: Zeus Virus Detected on your Computer!

Please do Not Shut down or reset your computer. This Virus is well known and mostly distributed through Adult/Porn sites. Pornography uploaded detected. Commonly used to steal personal and financial information from the infected device. Your device might also be used for performing DDOS attacks by cyber criminals and cause serious harm to other networks and websites. Please call Microsoft to rectify the issue and get your PC unlocked.

Screen shot of a tech support scam.
Important Alert – Your Computer At Risk

Zeus Virus Found

Screen shot of a tech support scam.
*** Microsoft Alert ***

System Blocked for Security Reasons. Call Microsoft Toll Free/ Please ensure you do not restart your computer it may lead to Permanent Damage to the System or Data loss. WARNING – Microsoft windows has detected that zeus virus has infected your system.

Windows Detected Potential Threat On your Computer. Windows Security Essentials wasn’t able to block virus. Windows detected potential threats that might compromise your privacy or damage your computer. Error Code: 0x8024402c, windows couldn’t install the definition updates

Screen shot of a tech support scam.
** YOUR COMPUTER HAS BEEN BLOCKED **

Error # 268D3-XC00037 Please call us immediately. Do not ignore this critical alert. If you close this page, your computer access will be disabled to prevent further damage to our network.

Your computer has alerted us that it has been infected with a virus and spyware. Call for support.

Screen shot of a tech support scam.
A problem has been detected and Computer has been frozen to prevent damage to your computer.

The problem seems to be cause by the following file: kbdhid.sys

MANUALLY INITIATED CRASH If this is the first you’ve this stop error screen, DO NOT RESTART your computer, and follow these steps. Online Support for Toll Free

Screen shot of a tech support scam.
0x000314CE VIRUS DETECTED WITHOUT CANCELLING PENDING OPERATIONS

Hard Drive Safety Delete Starting. To STOP Deleting Hard Drive Call:

ERROR CODE: 0x000314CE Please contact technical support Toll Free To immediately rectify issue and prevent data loss

Screen shot of a tech support scam.
** YOUR COMPUTER HAS BEEN BLOCKED **

Error # 268D3 Threat Detected

Object Error # 268D3 (Unauthorized access) Region Russia, Chaina, Vietnam

Action: Do Not Shut down or Reset Your Computer, Call Security Expert and Scan Your Device and Network Now

Screen shot of a tech support scam.
Your Windows has been blocked due to suspicious activity! Please call Support Now! Call Toll-Free to find the right solution.

Your PC ran into a problem and needs urgent attention. You need to contact support at toll free. Error code for this problem is 0x000019F. Please share this code with support expert so that you can get the instant solution for this problem.

ERROR DESCRIPTION Error Code: 0x000019F Possible Reason: Security Breach/Virus Attack

Screen shot of a tech support scam.
A problem has been detected and System has been shut down to prevent damage to your computer. Check with your System Vendor for any BIOS updates. Disable BIOS memory options such as caching or shadowing.

Technical Information *** STOP: 0x00000ED (0x80F128D0, 0xc000009c)

Contact Certified System Technicians For Immediate Assistance

Screen shot of a tech support scam.
Windows Warning Alert

Malicious Spyware/Riskware Detected Error # 0x80072ee7

Please call us immediately. Do not ignore this critical alert. If you close this page, your computer access will be disabled to prevent further damage to our network. Your computer has alerted us that it has been infected with a Spyware and riskware.

Screen shot of a tech support scam.
Dear Microsoft Corporate Customer,

Your Windows 10 Support – Case ID Is 26310

POSSIBLE ERRORS! Call immediately. Case ID 26310.

Screen shot of a tech support scam.
Warning: Internet Security Damaged !!!

A Suspicious Connection Was Trying to Access your Logins, Banking Details and Tracking your Internet Activity. Your TCP Connection Was Blocked by Your Firewall. Your Accounts May be Suspended Until You Take an Action. Your Personal Information May Have Leaked. IMMEDIATE RESPONSE REQUIRED.

Your Hard Disk May Have Trojan Virus! Please Do Not Try to fix Manually, It May Crash Your Data. Consequently, we are performing additional security checks to verify system security. Please Visit Your Nearest Windows Service Center OR Call Help Desk

Screen shot of a tech support scam.
WARNING! The adult website you have visited in the last 24 hours is infected with Trojan Cerber2.downloader. It is a self-replicating virus which can block your personal files, Email, Facebook and Banking accounts.

Microsoft Windows OS Platform detected major Malware and Virus Download from the Internet. DO NOT TRY TO CLOSE THIS PAGE.

Microsoft Security Essential to Scan your Windows OS Platform PC.

Screen shot of a tech support scam.
Your Windows PC is infected with (2) Viruses!

The pre-scan found traces of (2) malware and (1) phishing/spyware. System damage: 28.1% – Immediate removal required!

The removal of (2) Viruses is required immediately to prevent further system damage, loss of AppsApps Applications or Apps An application (software), commonly referred to as an ‘app’ is a program on a computer, tablet, mobile phone or device. Apps are designed for specific tasks, including checking the weather, accessing the internet, looking at photos, playing media, mobile banking, etc. Many apps can access the internet if needed and can be downloaded (used) either for a price or for free. Apps are a major point of vulnerability on all devices. Some are designed to be malicious, such as logging keystrokes or activity, and others can even transport malware. Always be careful about any app you are thinking about installing., Photos or other files. Traces of (1) Phishing/Spyware were found on your computer. Personal and banking information at risk.

Screen shot of a tech support scam.
bsod : dll registerserver failed with the error code 0x80040201

Windows Defender Error Code 0x800733afc

0x000000CE DRIVER UNLOADED WITHOUT CANCELLING PENDING OPERATIONSError Code 0x800705b4 when Starting Windows Defe