Tech support scams have been around for years, but a new variant called the Phantom Hacker scam is rapidly gaining traction. Since 2023, mostly older Americans, mostly older Americans, have suffered more than $500 million in casualties. This scam is particularly deceptive as it unfolds in three carefully coordinated stages and avoids detection using AI-driven social engineering tactics. Attackers use caller ID spoofing and AI-generated voices to make the scheme more convincing, but there are ways to protect themselves.
Be protected and informed! Get security alerts and expert technical tips –Sign up for The CyberGuy Report in Cart now.
Illustration of a phantom hacker at work (Kurt “Cyberguy” Knutsson)
How Phantom Hacker Scam Works
As Emphasised by the FBIThe scam starts with the technical support scammer phase. You may receive phone calls, emails, texts, or even pop-ups warning you that your device has been compromised. This message is recommended to call your customer support number for assistance. Once you do it, the scammer will pose Technology support They claim that hackers are targeting their accounts. To “help” you can instruct them to download remote access software and allow them to control their computer. Voice to be a threat scan, they trick you into revealing your financial account and set the next stage of fraud.
Next is the fraudster stage of financial institutions. Another scammer will appeal to you to warn foreign hackers that they are infiltrating your account, pretending they are from banks or investment companies. They advise you to move your money into a “safe” government-secured account. They often use wire transfers, cryptocurrency, or cash deposits. They may also insist on maintaining confidentiality in the transaction, claiming it is necessary for security reasons.
In the final US government fraudster stage, the third fraudster impersonates federal officials, often pressured by the Federal Reserve to act quickly. If you start to doubt the scheme, they may send you an official appearance email or document to convince you that the transfer is legal. By the time the victims realized they had been fooled, their money was gone and they were often sent abroad out of reach of US authorities.

Illustration of a phantom hacker at work (Kurt “Cyberguy” Knutsson)
Spotify playlists are hijacked to promote pirated software and scams
How AI is making things worse
AI is more deceptive and hard to spot scams like Phantom Hacker’s scams. Scammers use chatbots with AI to automate schemes. Instead of relying on human operators, we can now deploy natural, persuasive, AI-driven responses.
AI Generation Deepfake voice It is also used to impersonate bank officials and government representatives. Scammers can use short audio samples to clone the audio and make the call look even more authentic. This means that victims may hear what sounds like a bank manager or a Federal Reserve official.
Email scams are also more refined. AI tools can create messages that mimic the tone and style of official communication. Scammers can even use official letterheads to generate fake yet realistic documents to convince victims that the fraud is justified.

Illustration of someone getting a Deepfake Scam Call (Kurt “Cyberguy” Knutsson)
9 Ways Scammers Try to Deceive You Using Your Phone Number
Seven ways to protect yourself
The best way to protect yourself from the Phantom Hacker Scam is to provide information, beware, and follow these steps:
1) Ignore unsolicited messages: Scammers often send pop-ups, text messages or emails claiming that their computer is infected or that their bank account is at risk. These messages may seem official, but they are designed to create panic and pressure you to take action immediately. Do not click on links or attachments from unknown senders. This is because it may contain malware or lead to phishing websites that steal your personal information.
2) It has powerful antivirus software: The best way to protect yourself from malicious links to install malware is to install antivirus software on all devices, as it may access your personal information. This protection can also warn you that it will phish email and ransomware scams and keep your personal information and digital assets safe. Get the best 2025 Antivirus Protection Winners picks for Windows, Mac, Android and iOS devices.
3) Check your phone number before calling: If you receive an unexpected message that prompts you to call technical support, do not use the number provided in the message. Instead, go to the official website of the company in question to find customer support contact information. Scammers often create and use fake websites Caller ID Spoofing Always double check before making a call to make your phone number look legitimate.
4) Avoid downloading unknown software: Reputable companies will not ask you to install remote access tools unless you reach out specifically for technical support. Scammers use these programs to control their computers, monitor their activity, and access sensitive information. If someone unexpectedly downloads the software and requests you to “fix the problem” or “protect your account”, it’s probably a scam.
5) Don’t control the device to strangers: By allowing scammers to access their computers remotely, they can view personal files, record keystrokes, and interact with their accounts without their knowledge. A legitimate customer support representative will not request remote access unless they initiate a support request through an official company channel. If someone insists on controlling your device, hang up immediately.
6) Be skeptical of emergency financial warnings: The US government never unexpectedly contacts you and requires you to move your money into a “secure account.” They will also never ask them to wire their funds, buy gift cards, or send cryptocurrency as a form of payment. The con man creates a false sense of urgency to trick victims into acting and acting before thinking critically about the situation. If someone claims it’s from a bank or government agency, pressures you to move the money, stop and verify their identity through official channels.
7) Invest in personal data removal services: Scammers often collect information from data broker websites to make scams more persuasive. Your name, phone number, home address, and even your financial history may be published without your knowledge. Consider using data deletion services to periodically scan and request the removal of personal information from these databases. This reduces the chances of fraudsters targeting you with highly personalized attacks. You can also manually opt out of major data broker sites, but using the service automates the process and protects your information over time. Check out our top picks for data deletion services.
Important points of cart
The Phantom Hacker Scam is designed to be compelling, but understanding how it works can help you stay a step ahead. Scammers rely on fear, urgency and deceptions of victims, but remain cautious, confirm requests through official sources, and do not share personal or financial information with unknown callers This allows you to protect yourself.
Do you think law enforcement and tech companies are doing enough to combat AI-powered fraud? Write us and let us know cyberguy.com/contact.
For more information about my tech tips and security alerts, sign up for our free Cyberguy Report Newsletter cyberguy.com/newsletter.
Ask us a question in our cart or let us know what you want us to cover.
Follow your cart on his social channels:
Answers to the most asked Cyber Guy questions:
New from Cart:
Copyright 2025 cyberguy.com. Unauthorized reproduction is prohibited.