ScamWatch

If you feel you're being scammed in United States: Contact the Federal Trade Commission (FTC) at 1-877-382-4357 or report online at reportfraud.ftc.gov

How Tech Support Scams Hijack Legitimate Websites — 6 Signs to Spot Fake Support Numbers

Businesswoman in stress at outdoor table, seeking support from colleague.

Introduction — Why legitimate websites show fake support numbers

Most people assume that a company’s website is a safe place to look for help. Unfortunately, attackers increasingly find ways to display fraudulent phone numbers and urgent "call us" messages on otherwise legitimate sites. These hijacked support listings drive victims to scammers who use social engineering and remote-access tools to steal data and money.

This article explains how attackers can insert fake support numbers into trusted sites, lists six clear signs that a number is fraudulent, and gives step-by-step actions for visitors and website owners to verify, respond, and recover.

How scammers place fake support numbers on real sites

There are several common technical and supply-chain paths attackers use to make a fraudulent support number appear on a legitimate web page:

  • Compromised third-party widgets or ads: Malicious JavaScript loaded from an ad network, chat widget, analytics plugin, or CDN can modify page content and insert phone numbers or pop-ups.
  • Site compromise (CMS/plugin vulnerabilities): Breached admin accounts or outdated plugins allow attackers to edit contact sections, footers, or help pages.
  • DNS hijacking or temporary redirects: DNS tampering or malicious redirects can show a spoofed copy of a page with a fake support number.
  • Typosquatting and cloned pages: Attackers clone or create lookalike domains that appear nearly identical to the target brand and list their own numbers.
  • Supply-chain attacks: A compromised vendor (e.g., live chat vendor) updates code that every client site loads, propagating fraudulent contact info widely.
  • Browser extensions and local malware: Malicious extensions or ad-injecting malware can alter what a user sees in their browser, even when the site itself is unchanged.

Understanding these methods helps both users and site operators choose the right verification and mitigation steps.

6 signs a support number is fake — quick checklist

When you see a support phone number or an urgent "call now" message, quickly check these red flags:

  1. Number not listed on official channels: The phone number is not on the company’s verified support page, official app, verified social profile, or in emailed receipts.
  2. Pressure, urgency, or threats: The message forces immediate action ("Call now or lose access") — a classic social-engineering pressure tactic.
  3. Payment methods requested up front: The support rep asks for gift cards, wire transfers, or cryptocurrency as a condition of support or to "fix" your issue.
  4. Request for remote access or credentials: The number quickly leads to instructions to install remote-access software or disclose one-time passwords (OTP) or account credentials.
  5. Branding, grammar, or contact mismatch: The phone greeting, email domain, or page styling doesn’t match the brand’s official look-and-feel, or uses free email domains (e.g., @gmail.com) for "support."
  6. Unusual country code or local number for a domestic company: A U.S. company listing an unfamiliar international number or a toll-free number that routes overseas can be suspicious — verify with other official sources.

Quick verification steps (2-minute checks)

  • Open an official channel: visit the company’s official support/contact page (not a search result ad) and compare numbers.
  • Use the product or app: Many companies include verified help inside their official app or account pages.
  • Search the number: run a quick reverse phone lookup or search the number with the brand name to see if others reported it as fraud.
  • View page source: advanced users can inspect network calls or the page source to see injected scripts or unknown third-party resources.

If you already called or gave access — immediate actions

  • Disconnect and document: End the call, take screenshots, and note the number and any names used.
  • Change passwords & add MFA: Immediately change passwords for affected accounts and enable two-factor authentication.
  • Revoke remote access and scan devices: Uninstall any remote-access tools, run antivirus scans, and consider a professional device check if sensitive data was exposed.
  • Contact banks and card issuers: Alert financial institutions if you shared payment info or completed transactions.
  • Report it: File a complaint with local law enforcement, national fraud agencies (e.g., the FTC in the U.S.), and the impersonated company’s official support team.

Tip for website visitors: If you’re unsure, use an alternate verified channel (official app, verified social account, or known support email) to confirm the number before calling.

Guidance for site owners — prevent hijacked contact info

Website operators can reduce the attack surface by:

  • Keeping CMS, themes, and plugins patched and limiting admin access.
  • Monitoring and vetting third-party scripts; use a Content Security Policy (CSP) and Subresource Integrity (SRI) where possible.
  • Using a web application firewall (WAF) and malware scanning to detect injected code quickly.
  • Auditing vendor and ad partners for security hygiene and minimizing unnecessary third-party includes.
  • Displaying contact info in multiple verified places (PDF support documents, secure account pages) and using signed certificates and HSTS to guard against tampering.

Combining visitor education with strong site controls dramatically reduces the success rate of these scams.

Closing: Attackers rely on trust and urgency. A few verification steps — checking official channels, avoiding immediate remote access, and verifying payment requests — stop most tech-support scams in their tracks. If you suspect fraud, collect evidence and report it to the company and the appropriate authorities right away.