Tech Support Scams: The Basics
Tech support scams typically begin with alarming pop-ups or unsolicited calls claiming a device is infected or has critical errors. Victims are urged to install remote-access software—like TeamViewer or AnyDesk—granting scammers control over their systems. From there, the fraudster fabricates problems and charges victims to “fix” non-existent issues, often demanding payment via gift cards, cryptocurrency, or bank transfers . These scams disproportionately impact older adults and seniors, who are more susceptible to social engineering and often lose substantial sums .
When Tech Support Scams Meet Money Laundering
As tech support scams proliferate, fraud networks have increasingly turned to money laundering to move and conceal illicit proceeds. Criminals often use shell companies, crypto platforms, and informal systems like hawala to obscure transaction trails.
A powerful recent example comes from India: the Enforcement Directorate executed a major raid in Chandigarh and the Tricity region, shutting down several fake IT firms pretending to be global tech brands like Microsoft and HP. These operations leveraged shell companies and foreign payment gateways to launder funds globally, including via hawala—highlighting the transnational and sophisticated nature of such crimes .
U.S. Cases That Illuminate the Threat
-
Massachusetts Tech Support Scam Surge (2025): Reported losses for the state skyrocketed from under $1.2 million in 2019 to more than $50 million in 2024—underscoring how lucrative money laundering through these scams can be .
-
Federal Seizure via Tether (2024): Cryptocurrency firm Tether froze $1.4 million of scam proceeds at the behest of U.S. law enforcement, demonstrating the effectiveness of blockchain cooperation in suspending criminal flows .
-
Victim Recovery and Forfeiture (2025): In a tech support scam case involving a Microsoft impersonation, authorities reversed $221,000 of illicit transfers and recovered an additional $328,573—highlighting the success of rapid investigative and enforcement response .
What CFEs Should Know and Do
As Certified Fraud Examiners, you’re well-positioned to spot and disrupt these laundering channels:
-
Map the Payment Path
Trace payments through domestic and international routes—watch for gift cards, crypto wallets, offshore payment processors, or hawala networks.
-
Collaborate with Crypto Partners
Leverage resources like Tether and blockchain analytics to freeze and trace illicit crypto payments.
-
Identify Corporate Fronts
Tech support scams often use shell call centers or fake entities posing as well-known brands—regulatory filings, website registration info, and operational documentation can reveal inconsistencies.
-
Monitor Victim Patterns
Older victims often show patterns of emotional processing—not fraud. Be alert to repeated, high-value transfers for “repairs,” purchases of prepaid instruments, or sudden crypto usage.
-
Engage Authorities Swiftly
Work with the FBI, FTC, state agencies, and foreign counterparts when funds move across borders or through unregulated channels.
-
Public Education & Prevention
Educate communities about the scams, warning signs (e.g., unsolicited calls, remote access requests), and safe payment practices.
In Summary
Tech support scams are no longer just about stolen data or one-off extortion—they’re now sophisticated laundering operations exploiting technological gaps, jurisdictional complexity, and vulnerable populations.
By combining forensic accounting, cyber intelligence, blockchain tracing, and cross-agency collaboration, CFEs can identify and dismantle these fraud pipelines—protecting victims and upholding financial integrity.