This article is brought to you by Aura.
Watch the video to see how we protect you online.
This article is brought to you by Aura. Watch the video to see how we protect you online.
Start Free Trial
White arrow pointing right, used for navigation
4.7-star rating on Trustpilot
4.7 stars on Trustpilot
White close button to close the window or modal
Play button to start video/audio
What is Aura? (1:10)
Play button to start video/audio

Do Scammers Have Remote Access To Your Computer? Do This

If you gave a scammer remote access to your computer, don’t panic. You can still regain control by following these steps.

Illustration of a hand reaching out of a computer's screen and controlling a woman's hand like a puppet.

Aura’s app keeps you safe from scams, fraud, and identity theft. Try Aura for free.

Trustpilot logo4.5-star rating on Trustpilot
4.6 stars as of Sept. 2024

In this article:

    In this article:

      See more
      Illustration of a hand holding a phone that resembles a lock

      Aura’s digital security app keeps your family safe from scams, fraud, and identity theft.

      See pricing
      White arrow pointing right, used for navigation
      Share this:

      Did You Give a Scammer Remote Access To Your Computer?

      Remote access scams are some of the most devious, dangerous, and complicated schemes out there. In these scams, fraudsters trick victims into downloading apps that give up total control of their computer to the scammers. Once inside, cybercriminals can steal your personal data, spy on your, or break in to your email, banking, and social media accounts.

      According to the latest data from the FBI’s Internet Crime Complaint Center (IC3) [*]:

      Tech support scams — including remote access scams — cost victims over $800 million in 2022 alone.

      If you give tech support scammers remote access to your computer, you need to act quickly.

      In this guide, we’ll explain how to regain control of your computer, identify future remote access scams, and protect yourself from malicious hackers.

      {{show-toc}}

      What Can Scammers Do With Remote Access to Your Computer?

      Remote access scams occur when scammers pose as tech support agents or use other phishing attacks to dupe you into giving them remote access to your computer.

      Scammers will almost always start by impersonating a legitimate support agent from a tech company or retailer — such as Microsoft, Amazon, or the Best Buy Geek Squad.

      Then, they’ll either reach out to you via phone call, text, or email — or create fake websites and pop-ups that fool you into thinking your computer is infected with malware and post phone numbers for you to call to get “help.”

      The sense of urgency and fear that your computer has been hacked is what allows scammers to bypass your natural suspicions. They’ll tell you the only way to fix the problem is to allow them to install remote desktop access software which gives them control of your computer.

      But what happens next?

      🛡 Get award-winning digital security. If hackers have remote access to your computer, your bank account, email, and other online accounts could be at risk. Try Aura’s #1-rated digital security solution free for 14 days to secure your devices (and identity) against scammers.

      If a scammer gets into your computer remotely, they could:

      • Crawl your hard drive for sensitive data, passwords, and photos. Scammers will quickly collect anything they can use to withdraw money from bank accounts, steal your identity, or extort you for money.
      • Install invasive malware or spyware. Scammers can install add-ons or programs that continually steal sensitive information or mask what they’re doing behind the scenes. So what you see on the screen isn’t what’s actually happening.
      • Commit identity theft. With all the personal information that they find on your computer, scammers will have everything they need to steal your identity.
      • Hold your information hostage. Hackers can download what’s called “ransomware” onto your computer. It locks all of your files unless you pay a ransom.
      • Sell your information on the Dark Web. People who commit fraud and theft on the Internet often make use of the Dark Web. This hidden illegal marketplace is a hotspot for scammers and hackers who buy and sell ready-made packages of stolen personal information.

      The bottom line: Remote access scams can give cybercriminals all they need to steal your identity and empty your bank account. You can take a proactive approach to scam and fraud prevention by signing up for Aura’s all-in-one digital security solution. Try Aura for free today.

      💡 Related: How To Spot Fake Apps: App Size, Permissions, Source

      Did You Give Someone Access to Your Computer? Do This Now

      1. Disconnect from the internet
      2. Update your passwords
      3. Scan for malware on your device
      4. Remove suspicious apps, browser extensions
      5. Back up your computer
      6. Restore computer to previous settings
      7. Update and secure your internet router
      8. Freeze your credit card and contact your bank
      9. Consider signing up for identity theft protection
      10. Report the scam to the FTC
      11. Verify any technical support services

      If your device has been compromised by a scammer, here’s how to reverse the damage as soon as possible: 

      1. Immediately disconnect your device from the internet

      Remote access scams depend on an internet connection in order to function properly. Removing the hacker’s access to your device is your first line of defense.

      Here’s what to do:

      • Click on the Wi-Fi icon in the upper-right corner of your computer screen, and toggle it to “off” to disconnect from the Internet. You can also do this in your device’s settings, usually under “network” or “Wi-Fi.”
      • You can also shut off your computer entirely for even more protection. Some types of malware, once installed, can run even without an internet connection.

      {{hacker-view-widget}}

      2. Use a different device to update your passwords

      Scammers will look for sensitive information like passwords and account numbers. With access to just your email account, they can hack into your bank account, social media profiles, and other online accounts. Minimize the damage by creating new passwords and locking scammers out of your accounts.

      Here’s what to do:

      • Before you start, make sure you’re using a device that’s not compromised. For example, use a smartphone, tablet, or another computer that hackers don’t have access to.
      • Log into all password-protected accounts, including email accounts and bank accounts, and change your passwords.
      • Set up a password manager to help manage your passwords and make sure that you’re using unique and secure passphrases.
      • Enable two-factor authentication (2FA) on your accounts to maximize your security. 2FA requires a special code whenever you log into an account, which hackers don’t have. For ultimate security, use an authenticator app rather than SMS for your 2FA codes.

      💡 Related: How To View (and Update) All Of Your Saved Passwords

      3. Use antivirus software to uncover malware on your device

      You’ll need help eliminating the harmful programs that fraudsters remotely install onto your device. This can’t be done manually. Instead, a trustworthy anti-malware or antivirus software program like Aura’s can identify, isolate, and neutralize malicious viruses.

      Here’s what to do:

      • If you haven’t invested in reliable antivirus software, now is the time. Install antivirus software, and run a full scan to detect any malware that has infected your device.
      • Make sure you keep your antivirus software up to date and schedule regular scans. Most antivirus programs work in the background to keep your computer secure.

      💡 Related: Is McAfee Identity Theft Protection Worth It in 2023?

      4. Remove suspicious apps, browser extensions, and add-ons

      Scammers use a combination of legitimate software, malware, and browser extensions to maintain remote control of your computer. Make sure you remove any apps, tools, or extensions that you don’t recognize.

      Here’s what to do:

      • Scan your Applications folder for any apps you don’t recognize. Be on the lookout for tools such as Remote Desktop, LogMeIn, TeamViewer, AnyDesk, and RemotePC.
      • Check for active remote access programs running in the background. On Windows, open the Task Manager by pressing Ctrl + Shift + Esc. On a Mac, open the Activity Monitor by pressing Command + Space. Alternatively, select the magnifying glass icon and search for Activity Monitor.
      • Open your browser and find “Extensions,” usually under the main menu or under “Settings.” Remove any you don’t use, and verify that the ones you have come from reputable companies.
      • You may also consider starting completely fresh by deleting and reinstalling your browser.
      🛡 Protect your devices (and data). Hackers are always finding new ways to hack into your devices. Aura's all-in-one solution keeps you safe with antivirus, a VPN, Safe Browsing tools, and more. Try Aura free for 14 days.

      5. Back up your computer

      Before you reset your device completely, make sure all your files and settings are safely copied onto an external hard drive or backed up onto the cloud.

      Here’s what to do:

      • If you have a Mac, you can use the Time Machine application to back up all your files automatically. This program is already built into your computer’s operating system.
      • On a Windows computer (with Windows 10 and later), use the built-in Backup option under “Settings.” If you have an earlier version of Windows, there are several third-party options available.
      • Use an external hard drive to store all your data in one place. As long as all your information fits and you don’t lose track of the physical drive, this is a practical option.
      • If you require extra storage space, you’ll need to back up all your data onto the cloud. If you choose this option, make sure your cloud-based storage system is reliable and secure.

      💡 Related: Pros and Cons of Using a VPN – Do You Need One?

      6. Wipe your computer and restore to previous settings

      Once all your data is saved in a secure location, you can wipe your hard drive completely and do a system restore. This essentially puts your computer back into its default state (before it was hacked). This is the last step to cleaning up your device.

      Here’s what to do:

      • Find a detailed guide online that’s specific to your device. Make sure you’re following a trustworthy source (for example, this guide from Insider).
      • Alternatively, use a guide directly from the manufacturer (like this guide from Microsoft).

      💡 Related: How To Tell If Your Computer Has a Virus (and What To Do)

      7. Update and secure your internet router

      The most sophisticated malware may be invasive enough to affect other devices in your household via your home internet connection. And in some cases, hackers will break into your home WiFi router to gain access to your devices. To prevent this, it’s a good idea to encrypt your home network.

      Here’s what to do:

      • Go into your router settings and ensure that it’s set to either WPA3 or WPA2. This is the default for most modern routers.
      • If these options are not available on the settings menu, your router has inadequate security capabilities. Consider purchasing a new router so that your information stays as safe as possible.
      • Change your router passwords (both the admin password and the WiFi password). This may require contacting customer support for the router manufacturer. Make sure you go to their official website directly to contact them.
      • Avoid turning on router features like WPS, “remote management,” and UPnP. While these have the benefit of convenience, they ultimately weaken the security of your router.

      💡 Related: What To Do If Your Email is Found on the Dark Web  →

      8. Freeze your credit card and contact your financial institutions

      Most hackers who initiate remote access scams are looking to steal your money or gain access to your bank account. Even if you haven’t seen any signs of financial fraud, you’ll want to preemptively cut off their access to your accounts as soon as possible.

      Here’s what to do:

      • Contact your bank(s) immediately and notify them that your account has been compromised.
      • Check for unauthorized charges to your account and ask your bank to reverse them.
      • If you believe the scammer has access to your personal data, consider setting up a fraud alert, credit lock, or credit freeze to prevent them from opening up new lines of credit in your name.

      9. Consider signing up for an identity theft protection service

      If hackers have remote access to your computer, they could have access to enough personal information to steal your identity. The risk of identity theft isn’t at the forefront of most people’s minds until their information has already been stolen. But identity fraud is much more prevalent — and debilitating — than you might think.

      Here’s what to do:

      • Sign up for an identity theft protection service like Aura. With Aura, you get fraud alerts up to 4x faster than the competition and $1 million in insurance coverage for eligible losses due to identity theft.
      • Aura also bundles identity theft protection and credit monitoring with digital security software. Every Aura plan includes features like a password manager, virtual private network (VPN), antivirus software, and more.

      💡 Related: What Is VPN on iPhones? Why You Need It & How To Turn It On

      10. Report the scam to the FTC and law enforcement agencies

      Sharing your report about an internet scam will help authorities protect others. It will also provide the documentation you need to dispute fraudulent charges and claim an extended fraud alert.

      Here’s what to do:

      • File a report with the FBI’s Internet Crime Complaint Center (IC3).
      • Report the scam to the Federal Trade Commission (FTC) at ReportFraud.FTC.gov.
      • If the scammer has stolen your personal information, file an identity theft report at IdentityTheft.gov.
      • If you know any details about the criminal that could help the police, contact your local law enforcement agencies and file a complaint.

      💡 Related: Does a VPN Protect You From Viruses?

      11. Thoroughly vet and verify any technical support services

      Prevention is the best protection. In the future, make sure you slow down and verify any technical support services before downloading software or giving anyone remote access to your computer.

      Take your time, even if you’re worried about a virus. In many cases, there is no malware, and the threat itself is part of the scam.

      If you want professional help restoring your system after a security breach, there are many safe ways to get it.

      For devices running Windows, contact official Microsoft support:

      • Visit support.microsoft.com
      • Businesses can call 1-877-696-7786

      For a Mac, iPhone, or iPad, get in touch with Apple support:

      • Visit support.apple.com
      • Call (800) APL–CARE (800–275–2273)

      Another trusted option is Best Buy Geek Squad. Their services include an array of security cleanup measures and support tools.

      💡 Related: How To Get Rid Of the Apple Security Alert and Mac Pop-up Scams

      How To Protect Yourself Against Remote Access Scams

      • Download reliable antivirus software and keep it up to date.
      • Use a privacy-focused browser (such as Brave or Firefox) and install an ad-blocker to fight pop-ups.
      • Consider activating your computer’s firewall capabilities via the privacy settings menu. This can help stop scammers from hacking your computer.
      • Learn the warning signs of a tech support phishing email and stay vigilant.
      • Regularly check your credit report and bank statements. Scammers are almost always after your financial accounts. Check for the warning signs of identity theft — such as strange charges on your bank statement or accounts you don’t recognize. An identity theft protection service like Aura can monitor your credit and statements for you and alert you to any signs of fraud.
      • Only look for technical support from reputable providers. Companies like Microsoft and Apple offer complimentary tech support services with the purchase of their devices. Always contact them using their official platforms only.
      • Never click on links in emails or text messages. If you think an account has been compromised, go directly to that site and log in.
      • Block and report any scam emails that come into your inbox so that they can’t reach you again.
      • Don't use simple or common passwords (such as "password123") that can be easily cracked using a password spraying or other brute force attack.
      • Never give anyone remote control over your device unless it is someone you know personally and trust.
      • Never pay for a service using gift cards — anyone who requests payment this way is a scammer.

      Lastly, Consider signing up for identity theft protection. Aura’s top-rated identity theft protection monitors all of your most sensitive personal information, online accounts, and finances for signs of fraud. If a Snapchat scammer tries to access your accounts or finances, Aura can help you take action before it’s too late. Try Aura’s 14-day free trial for immediate protection while you’re most vulnerable.

      💡 Related: Digital Security: How To Stay Safe Online in 2023

      The Bottom Line: Don’t Give Scammers Access to Your Computer

      If you’ve ever fallen for a remote access scam, you’ll develop a healthy dose of skepticism for unexpected messages that find you on the Internet.

      But without the right protections, sophisticated scammers can still get to you. Give your personal information the best protection possible by investing in a comprehensive cybersecurity platform like Aura.

      Get digital security, identity theft, and credit protection with Aura. Sign up for a free trial today

      Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.

      Is this article helpful so far?
      Yes
      No
      Skip
      Need an action plan?
      No items found.
      Is your child ready for a cell phone? Take this quiz to find out.
      Start Quiz
      White arrow pointing right, used for navigation
      Illustration of a tilted question mark
      What do hackers
      know about you?
      Run a scan and find out now.
      By entering your email and clicking "Scan", you agree to our Terms and acknowledge our Privacy Policy.

      Award-winning identity theft protection with AI-powered digital security tools, 24/7 White Glove support, and more. Try Aura for free.

      Related Articles

      An illustration of a scammer using the Wi-Fi icon (RSSI) as a desk
      Internet Security

      The Dangers of Using Public Wi-Fi (and How To Stay Safe)

      Public and unsecured Wi-Fi networks are convenient. But are they safe? Learn the 10 hidden dangers of unsecured and public Wi-Fi networks (and what to do).

      Read More
      January 10, 2023
      Illustration of a woman applying sunscreen to her child's back on the beach while her grandmother reads a book behind them.
      Family Safety

      Family Identity Theft Protection: The Parental Guide for 2024

      Protecting your kids, parents, and entire family from online risks in 2024 requires a combination of tools, tips, and best practices.

      Read More
      August 8, 2023

      Try Aura—14 Days Free

      Start your free trial today**