The Dangers of Unsolicited Tech Support Calls: A Cautionary Tale
In today’s digital age, cybersecurity threats are ever-present, and the recent experience of my father serves as a striking reminder of the potential risks. He received a phone call from someone claiming to be from his internet service provider (ISP), and, for reasons we are still trying to understand, he granted them remote access to his laptop using TeamViewer.
This situation escalated quickly when he noticed his screen went dark for several minutes—an alarming sign that prompted him to terminate the connection. As someone who isn’t particularly tech-savvy, I found myself feeling uneasy with numerous questions swirling in my mind. Could the caller have installed malicious software on his laptop? Was there a possibility they could monitor or control his device remotely?
Given my limited knowledge, which largely comes from watching shows like Mr. Robot, I decided to take action. My initial plan was to disconnect the internet, back up his documents, and perform a complete factory reset on his laptop. However, I wanted to ensure this approach was wise before proceeding.
Fortunately, after reaching out for advice, it became clear that I wasn’t alone in my concerns. Many experts recommended my intended steps as a reasonable response to potentially mitigate any damage caused.
Taking Action: A Step-by-Step Approach
Following this guidance, I followed through with my plan:
-
Disconnected from the Internet: This immediate action helps prevent any potential remote control and secures the device from outgoing communications.
-
Backed Up Important Files: I made sure to save any necessary documents while being cautious not to transfer any potentially infected files.
-
Factory Reset: Performing a factory reset on his laptop wiped all existing data and applications, effectively eliminating any threats that might have been introduced.
-
Running Malware Scans: After the reset, I used reputable software like Malwarebytes to conduct thorough scans, ensuring that the laptop was free from any lingering threats.
Conclusion: Lessons Learned
Ultimately, the situation ended relatively well. My father was understandably frustrated about needing to reset passwords that he had kept for years, but I highlighted that this precaution was necessary to secure his personal information.
Interestingly, the scammers reached out again, trying to lure him into their trap. This time, I was present and, firmly but politely, instructed them to discontinue their call. It seems we dodged a bullet, as it’s likely
Share this content: