Immediate actions to limit damage (first 24 hours)

If you believe you just received a fake tech support call, treat the situation like a security incident and act quickly. In my practice helping clients recover from scams, the first few hours are often decisive.

  • Disconnect the device: If you gave a caller remote access, disconnect the device from the internet immediately (turn off Wi‑Fi or unplug Ethernet). If the scam was via phone only, put the call on speaker and hang up.
  • Close remote sessions and uninstall tools: Remove any remote‑access apps (e.g., TeamViewer, AnyDesk, LogMeIn) the caller asked you to install. Do not re‑open them until a trusted IT professional checks your system.
  • Power down and isolate sensitive devices: For high‑risk situations (banking devices, work machines), power off and isolate the device until it can be inspected.
  • Change passwords: From a clean, uncompromised device, change passwords for your email, banking, social media, and any accounts the scammer may have referenced. Use unique passwords and enable multi‑factor authentication (MFA) wherever available.
  • Preserve evidence: Save call logs, screenshots of pop‑ups, emails, texts, receipts, and any remote session IDs. These help law enforcement and your bank investigate fraud claims.

Sources: FTC guidance on technology scams (https://www.ftc.gov) and identity recovery steps (https://www.identitytheft.gov).


Financial recovery steps

Scammers frequently request payment (gift cards, wire transfers, cryptocurrency, or credit card details). How you paid affects recovery options:

  • Credit/debit card payments: Call your card issuer immediately and ask to dispute the charge. Card networks and issuers can reverse unauthorized charges or open a fraud investigation. Keep a record of the agent’s name and case number.
  • Bank transfers and wire payments: Contact your bank right away. Bank transfers are harder to reverse, but rapid reporting improves chances. Ask about any available recall procedures and file a dispute.
  • Gift cards and cryptocurrency: These are the hardest to recover. Report the scam to the retailer (if applicable) and your card issuer, but plan for little to no recovery in many cases.
  • Check fraud and ACH: Notify your bank, put a stop payment if appropriate, and monitor account statements closely.

If you gave account details or credentials, ask banks to add extra verification to your accounts and consider temporarily freezing or closing affected accounts. For business owners, document the loss for potential tax or insurance purposes—some losses may be deductible or claimable under a business crime policy; see related IRS tax guidance and our posts on IT support services deduction and Business technology expenses deduction.

Sources: Consumer Financial Protection Bureau (CFPB) guidance (https://www.consumerfinance.gov).


Report the scam to authorities and industry partners

Reporting helps authorities track patterns and may increase your chance of recovery. File reports with:

  • Federal Trade Commission (FTC): Submit a report at ReportFraud.ftc.gov or visit https://www.ftc.gov. The FTC aggregates complaints for law enforcement and consumer alerts.
  • FBI Internet Crime Complaint Center (IC3): For large losses or cross‑border fraud, file at https://www.ic3.gov.
  • Your state Attorney General and local police: Some banks require a police report to process fraud claims or disputes.
  • The company imitated: If the scammer claimed to be Microsoft, Apple, Amazon, or your ISP, notify that company through its official support channels.

Record complaint numbers and include evidence (call time, phone number, screenshots, transaction receipts).


Identity theft steps if personal data was exposed

If the scam involved Social Security numbers, tax information, or other personally identifiable information (PII):

  1. Visit IdentityTheft.gov to create a recovery plan and get a personalized checklist (https://www.identitytheft.gov).
  2. Place a fraud alert with one of the major credit bureaus (Equifax, Experian, TransUnion). By law, placing an alert with one bureau triggers alerts at the others.
  3. Consider a credit freeze to block new credit accounts until you remove the freeze.
  4. Check your credit reports for unfamiliar accounts or inquiries; you can get free reports via AnnualCreditReport.com (https://www.annualcreditreport.com).
  5. File an Identity Theft Report (via FTC) and provide the report to financial institutions to support disputes.

The sooner you act, the easier it is to prevent new accounts being opened in your name.

Sources: FTC Identity Theft resources (https://www.ftc.gov) and IdentityTheft.gov (https://www.identitytheft.gov).


Technical cleanup and verification

After the immediate triage, bring the device to a trusted technician or use reputable security tools:

  • Run a full antivirus and anti‑malware scan using well‑known software.
  • Inspect for unauthorized user accounts, scheduled tasks, or unfamiliar services.
  • Reinstall the operating system or restore from a known good backup if you suspect persistent compromise.
  • Secure your home network: change router admin passwords, update firmware, and segment guest devices.

If this occurred on a business system, involve your IT department immediately and follow incident‑response procedures. For businesses, document the incident thoroughly for insurance and compliance purposes; if the scam involved service contracts or invoices, review them with counsel or your accountant and see our page on Technical Support Contracts Deduction for tax‑related context.


How to pursue refunds, chargebacks, and legal options

  • Credit card chargebacks: If you paid by card, file a chargeback with documentation. Issuers typically have specific timeframes—act fast.
  • Wire transfer recalls: Banks may help recall a wire if reported immediately; success varies depending on receiving bank cooperation.
  • Small claims court: For recoverable sums and clear evidence, small claims is an option. Consult local rules and get cost/benefit counsel.
  • Report to consumer protection agencies: Your complaints can prompt enforcement actions that help others.

In my experience, card chargebacks have the best track record for individual recovery. Wire transfers and gift cards are frequently unrecoverable, so prevention matters.


Preventing future fake tech support calls

  • Never accept unsolicited remote support: Legit companies don’t cold‑call to fix your computer.
  • Verify before trusting: Hang up and call the company’s verified support number from its website.
  • Teach vulnerable family members: Seniors are commonly targeted—set up family security practices and shared emergency contacts.
  • Use MFA and password managers: Strong, unique passwords and MFA make account takeovers much harder.
  • Maintain offline backups: Regular backups reduce leverage a scammer has over your data.

Common misconceptions I see

  • “It wouldn’t happen to me.” Scammers are persuasive and use social engineering — anyone can be targeted.
  • “If they know my name and company, it’s legit.” Scammers often research targets or use spoofed caller ID.
  • “Recording the call will prove it.” While recordings can be helpful, they don’t guarantee recovery; act on technical and financial remediation first.

Practical checklist (quick reference)

  • Disconnect device + close remote apps
  • From a clean device: change passwords + enable MFA
  • Contact bank/credit card issuer + dispute charges
  • File reports: FTC, IC3, state AG, local police
  • Place credit fraud alert or freeze if PII was exposed
  • Scan or restore device; consult trusted IT
  • Preserve evidence for disputes and investigations


Professional disclaimer: This article is for informational purposes only and does not constitute legal, tax, or financial advice. For individualized help, consult a qualified attorney, your bank, or a licensed cybersecurity professional. In my practice advising clients on scam recovery, I recommend documenting every interaction and moving quickly to limit financial and identity damage.

If your situation involves business systems, invoices, or potential tax implications, review relevant documentation and consider consulting a CPA. For more on tax treatment of expenses tied to tech support or remediation, see related entries on our site such as IT support services deduction and Business technology expenses deduction.

If you’d like a printable version of the checklist above or a downloadable sample complaint template for the FTC, I can prepare one for your use.