Dangers of Remote Access Scams: How Scammers Operate

Remote access refers to the ability to connect to and control a computer, network, or device from a different location using the internet or a private network. We can access files and software without having to be physically present. Scammers leverage this by tricking victims into granting them remote control of their devices, usually in the pretence of tech support or banking assistance. Once they gain access, scammers can then steal personal information or install malware.
According to the Singapore Police Force, there have been at least 198 reports of technical support scam cases, with total losses amounting to $17.5 million since January 2025. (Source: Singapore Police Force)
Knowing how to spot remote access scams and their warning signs is key to scam protection yet many fall prey as most people lack the technical knowledge and don’t understand the risks involved in allowing remote access. Scammers also make use of fear and urgency to spur victims into making rash decisions. They create panic - claiming that your computer has a virus or your bank account has been compromised. Modern scams also make use of spoofed phone numbers and fake websites that make themselves look legitimate. Victims, such as the elderly, who might not have someone to consult will easily fall for such tactics.
Understanding Remote Access Scams
How Remote Access Scams Work
Fake Alerts
Scammers impersonate trusted authorities and personnel such as technical support staff, bank officers or government officials. They claim that the victim has an issue with their personal device that requires their assistance.
Request for Remote Access
The fraudsters would convince you to download remote access software, claiming to help you resolve the 'issue'. Such remote access software include: TeamViewer, AnyDesk, Windows Remote Desktop etc. Such software exists on mobile devices too, which scammers use to commit access fraud.
Data theft and fraud
Scammers will take this opportunity to steal personal information such as banking details, and passwords or install malware to lock your device or spy on your activities.
Demand for payment
Scammers may usually ask for payment to ‘fix’ the issue, transfer your bank funds without consent or threaten you with ransomware.
Common Types of Remote Access Scams
Tech Support Scams
One of the most widespread forms of remote access scams is tech support scams. These scams begin with scammers impersonating technical support staff from companies such as Microsoft or Apple. They often initiate phone calls with the victims or send pop-up alerts claiming that the victims’ device has a virus or a security issue. In Singapore, since January 2025, over 198 technical support scam cases have resulted in $17.5 million in losses (Singapore Police Force). Look out for red flags such as unsolicited calls or pop-ups urging immediate action when it comes to computer technical support.
Banking Assistance Scams
Another form of remote access scam are banking assistance scams. Fraudsters impersonate bank officials from banks such as DBS and OCBC. They prey on fears of account compromise by claiming that they require remote access to fix an account issue or settle funds on the victim’s behalf. The Singapore Police Force reported that a Singaporean retiree lost $50,000 in 2024 after a fake bank officer accessed her device. Remember that legitimate banks rarely ask for remote access to fix problems with personal accounts.
Government Impersonation Scams
Scammers can also pose as government officials to gain remote access. They can claim that the victim is going to face an arrest or a fine. These scammers then request remote access to the victim’s devices, claiming to help them ‘solve’ these problems. In January 2025, Singapore’s Cyber Security Authority (CSA) reported cases of fraudsters posing as Chinese officials targeting locals. Be careful if supposed government officials request remote access. They do not usually do so.
Software Update Scams
Software update scams are a more sneaky variant of remote access scams. These scams often appear as pop-ups, tricking users into downloading malware disguised as software updates. This is known as a Trojan where scammers gain control of the computer through the malware unknowingly downloaded. The Mirai Botnet exploited such weaknesses in 2025, targeting internet-connected devices. Ensure that you double-check unexpected update prompts from unfamiliar sources.
Ransomware Delivery Scams
Scammers make use of remote access to download ransomware into the victim’s device. This locks files and accounts and even the victim’s devices, until payment has been made to the scammers. The fraudsters usually make use of methods such as government official impersonation or tech support impersonation to gain remote access. They then download such ransomware, before demanding cryptocurrency as payment.
The Dangers of Remote Access Scams
Financial Loss
One of the biggest dangers of remote access fraud is financial loss. Scammers trick their victims into gaining access to their computers, often under the deception of technical support. Once they are granted access, scammers can install keyloggers to steal personal banking credentials or even manipulate victims to transfer money directly. In the first months of 2024, at least 150 Singaporeans fell prey to remote access scams, losing more than $ 15.1 million.
Identity Theft
After scammers gain access to your personal device, they can easily access personal information such as your NRIC number or your saved passwords. As such, they are easily able to enter your different accounts, stealing precious information. Scammers may also impersonate you to open fraudulent accounts or even take out huge loans.
Device Compromise
Once fraudsters gain access to your device, they are free to do what they please. Scammers can install malware, ransomware or spyware. This not only locks you out of your device but also lets them monitor your activity or spread the virus to other connected devices, amplifying security risks. They may also demand payment from you to regain access.
Emotional Impact
Overconfidence is a big factor as to why victims fall prey to remote access scams. So, those who are scammed will feel more ashamed and violated. The financial loss also adds to this emotional impact as some of them may even lose their life savings or money that is important to them. The elderly, who might not have someone to turn to may take this loss far greater than others too.
How to avoid remote access scams
Remote access scams can come in a variety of ways, often overlapping phishing scams and internet fraud. It is important to know how to recognise them and avoid remote access fraud with the right steps. Scammers often pose as legitimate entities to trick you into granting them access to your device. Understand the red flags and warning signs of remote access scams. These signs of a remote access scam are hallmarks of cyber fraud and online scams.
Verify the source before acting
A common tactic of remote access scammers is they impersonate trusted companies such as Microsoft, authorities such as the Police Cyber Department, or a bank official. If you get an unsolicited call or message from people claiming to be from these entities, do not trust it blindly. These might come in the form of pop-ups or emails as well, so it is important to stay alert. Liaise directly with the entity that is trying to contact you through their official contact information. Verify that the call is truly from a registered source before granting any form of remote access to the other person.
Never share remote access without confirmation
Legitimate entities rarely will ask to assist with your problems through remote access. If the other party requests you to download remote access software such as TeamViewer or AnyDesk to ‘fix’ your device, say no. Only grant access if you have made sure to verify the source of the contact. Make sure that the verification is done through the official contact information of the entity as well.
Watch for red flags
Scammers often make use of fear and urgency to get victims to follow their instructions. Be extra cautious if the other party wants you to act quickly to fix a ‘computer virus’ or ‘secure’ your bank details. Pop-ups and fake virus warnings that appear out of thin air are also usually a sign of a scam. Real companies will not pressure you into making decisions. Watch out for strange payment requests as well. Scammers would request payment in cryptocurrency, gift cards or wire transfers. Such methods are harder to trace. Remember that legitimate tech support or banks will not ask for payments this way.
Know the warning signs
Be alert to these red flags that signal potential remote access scams:
Unsolicited contact claiming there is a problem with your device or accounts
Pressure tactics creating artificial urgency to act immediately
Requests to download remote access software
Warnings about threats that you have not noticed yourself
Poor grammar or spelling in official-looking communications
Callers who refuse to provide verifiable credentials or call-back information
Secure your devices with strong passwords
Securing your devices with strong passwords is an important step to prevent remote access fraud. By implementing strong passwords and two-factor authentication, you can reduce the risk of scammers entering your accounts to install malware or steal personal data. Regularly update your security settings and install reputable firewall applications.
Report suspicious activity to the authorities
If you receive contact from suspected fraudsters, report this to the police or report it to us. This can help keep others safe, preventing this scammer from trying to trick others. When providing legitimate remote access, monitor for any suspicious activity by the other party. Ensure that the person does not access any files or documents that he is not supposed to. Monitor bank accounts and ensure that there are no unauthorised transactions. After the remote access is done, check files to ensure that none of them are missing or locked. If there are any suspicious activities, report the matter to the police.
Report Suspicious Activity
If you encounter a potential remote access scam, report it to:
ScamShield 24/7 helpline at 1799
Police at 1799 or
- Alert the company being impersonated so they can warn other customers
- Share your experience (without personal details) to educate friends and family
Check with Scam.SG
Before engaging with a technical support company, check for the company’s legitimacy. We make use of our proprietary TrustScore system, which is a powerful AI-driven metric to evaluate the trustworthiness of online entities. Scam.SG’s educational articles are also tailored to different age groups and technical proficiency levels, helping all Singaporeans recognise remote access scam tactics. Our reporting tools also allow you to contribute to community protection by flagging suspicious communications.
Recent Developments in Remote Access Scams
In January 2025, Singapore's Cyber Security Agency (CSA) highlighted a Mirai-based botnet campaign which “exploit weaknesses in internet-exposed devices to launch distributed denial-of-service (DDoS) attacks.” CSA advised users and administrators to:
Check for software updates regularly and install them promptly;
Turn off remote access to Internet-connected devices such as cameras and printers, where possible;
Change default credential(s) to include a mix of uppercase and lowercase letters, numbers, and symbols of at least 12 characters; and
Scan their network for possible gaps in security.
Government Impersonation Scams
Fraudsters, pretend to be bank officers and Chinese officials investigating nefarious activities and coerce victims, with threats of financial loss or legal penalties, to download remote access applications. They make unauthorised fund transfers after gaining remote access to the victim's bank accounts and/or mobile devices. (Source:The Straits Times)
Technical Support Scam Investigations
Since January 2024, the number of technical support scams are increasing and Singapore Police Force are investigating persons suspected to be involved in such scams.
Conclusion
To be safe online, we need to be aware of the risks involved and be on guard for nefarious activities by scammers. To protect our loved ones, and ourselves we should be doing the following:
- practice due vigilance
- take on continuing education
- have strong security practices
- recognise signs of scams
- make use of resources such as Scam.SG