Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
Security researchers have identified a widespread tech support scam targeting Windows users through fake Microsoft Defender alerts displaying “Error: Ox800VDS” messages. This social engineering scheme attempts to trick victims into calling fraudulent support numbers, potentially leading to financial losses, data theft, and malware infections. Our analysis reveals how this increasingly common scam operates and what steps users can take to protect themselves.
Threat Type: | Technical support scam, phishing, social engineering |
Affected Platforms: | Windows operating systems, primarily targeting Edge and Chrome browsers |
Distribution Method: | Malicious websites, compromised websites, deceptive advertisements |
Impersonated Service: | Microsoft Windows Defender, Microsoft Support |
Data at Risk: | Microsoft credentials, banking information, remote access to device |
Fake Support Numbers: | +1-855-904-3444, +1-855-200-1145, +1-866-808-0768, and others |
Threat Level: | High |
IoC Type | Value | Notes |
---|---|---|
Phone Numbers | +1-855-904-3444, +1-855-200-1145, +1-866-808-0768 | Primary contact numbers displayed in scam popups |
Domain Pattern | *-microsoft-support.*, *-windows-security.*, *-defender-alert.* | Common patterns in fraudulent domains |
URL Pattern | /security/defender/alert/ox800vds/, /windows/error/0x800vds/ | Common URL paths in attack websites |
JavaScript Indicators | window.addEventListener(“beforeunload”, preventClose); disableBackButton(); | Scripts used to prevent browser navigation away from scam page |
Remote Access Tools | AnyDesk, TeamViewer, UltraViewer | Legitimate tools abused by scammers for remote access |
Error Code | Ox800VDS | Distinctive fake error code not used by Microsoft |
This sophisticated tech support scam mimics Windows OS graphics and the Microsoft Defender interface to create a convincing illusion of a legitimate security alert. The attack progresses through several distinct stages:
Attack Stage | Description | Technical Details |
---|---|---|
1. Initial Access | Users encounter the scam when visiting compromised websites, clicking malicious advertisements, or being redirected through a chain of suspicious sites | Often uses iframe injection in legitimate but compromised sites, or malvertising campaigns |
2. Fake Scanning Animation | The scam page displays a convincing replication of the Microsoft Defender interface, complete with a fake scanning animation | Uses CSS animations and JavaScript setTimeout() to simulate scanning process |
3. Error Alert Display | Multiple pop-up windows appear with alarming messages, the primary one showing “Error: Ox800VDS” and claims about infected files | Uses window.alert() and custom modal dialogs with setTimeout() for sequencing |
4. System Lock Claim | A prominent pop-up states that the operating system has been locked due to “unusual activity” | Often implements browser fullscreen API requests and navigation interference |
5. Credential Harvesting | Users are urged to sign in with Microsoft credentials to “verify identity” and “unlock system” | Implements fake login forms with data exfiltration via XMLHttpRequest or fetch API |
6. Browser Manipulation | JavaScript techniques prevent users from closing the browser normally, creating a sense of panic | Uses onbeforeunload event handlers, history.pushState() for back button disabling |
7. Phone Call Pressure | Throughout these alerts, fake Microsoft support phone numbers are displayed with urgent instructions | Often displays countdown timers to create urgency using setInterval() |
Source: Analysis of “Error: Ox800VDS” tech support scam methodology, May 2025
When victims call the phone numbers displayed in the “Error: Ox800VDS” scam, they are connected with fraudulent “technicians” who deploy several deceptive tactics:
Many victims report that after paying once, they are often targeted repeatedly with additional “issues” requiring further payments.
Risk Type | Details | Severity |
---|---|---|
Financial Loss | Victims typically pay between $200-$600 for nonexistent problems, often multiple times through recurring scams | High |
Identity Theft | Personal information and login credentials captured during the scam can be used for identity fraud or sold on dark web marketplaces | High |
Account Compromise | Microsoft account credentials can be used to access email, OneDrive, purchase history, payment methods, and other sensitive information | High |
Device Infection | While connected via remote access, scammers often install persistent backdoors, keyloggers, or other malware for continued access | Medium |
Data Loss | Some victims report scammers threatening to delete files if payments aren’t made, or accidentally damaging systems during remote access | Medium |
Secondary Scams | Initial victims are frequently added to “sucker lists” and targeted for additional scams | Medium |
Fake Support Numbers | Status | First Reported |
---|---|---|
+1-855-904-3444 | Reported as Fraudulent | February 2025 |
+1-855-200-1145 | Reported as Fraudulent | February 2025 |
+1-866-808-0768 | Reported as Fraudulent | March 2025 |
+1-844-200-3515 | Reported as Fraudulent | March 2025 |
+1-833-590-8176 | Reported as Fraudulent | March 2025 |
+1-866-797-9553 | Reported as Fraudulent | April 2025 |
+1-866-790-8595 | Reported as Fraudulent | April 2025 |
+1-855-399-1058 | Reported as Fraudulent | April 2025 |
+1-866-993-8594 | Reported as Fraudulent | April 2025 |
+1-888-842-0786 | Reported as Fraudulent | May 2025 |
Note that new numbers are constantly being created as older ones get reported and shut down. Any phone number presented in an error message should be treated with extreme caution.
Method | Procedure | Difficulty |
---|---|---|
Task Manager | Press Ctrl+Alt+Delete or Ctrl+Shift+Esc to open Task Manager, select your browser in the Processes tab, and click “End task” | Easy |
Browser Session | When restarting your browser, decline to restore the previous browsing session to avoid reopening the scam page | Easy |
Keyboard Shortcuts | Try Alt+F4 to close the current window or press Esc repeatedly to dismiss dialog boxes | Easy |
Safe Mode | If the browser persistently reopens to the scam, restart your computer in Safe Mode to prevent automatic startup items | Medium |
Browser Cache | Clear your browser cache, cookies, and browsing history to remove any persistence mechanisms | Medium |
Action | Details | Priority |
---|---|---|
Disconnect from internet | Temporarily disconnect your device to prevent further remote access or data exfiltration | Immediate |
Remove Remote Access Software | Uninstall any remote access programs that were installed during the scam (TeamViewer, AnyDesk, UltraViewer, etc.) | Immediate |
Change Passwords | Immediately change passwords for any accounts you logged into while the scammer had access, especially your Microsoft account | Immediate |
Run Security Scan | Use reputable security software to scan your entire system for malware that may have been installed | High |
Contact Financial Institutions | If you made any payments, contact your bank, credit card company, or payment service to report the fraud and attempt to reverse charges | High |
Report Gift Card Scams | If you paid with gift cards, contact the gift card issuer immediately to report the fraud (though recovery is unlikely) | High |
Report to Authorities | File a report with the Federal Trade Commission (FTC) and the Internet Crime Complaint Center (IC3) | Medium |
Monitor for Identity Theft | Check your credit reports regularly and consider placing a credit freeze if you shared sensitive personal information | Medium |
Related Threat | Connection | Article Link |
---|---|---|
FakeCaptcha URL Scam | Uses deceptive web interfaces to trick users into executing actions that benefit attackers | Read More |
Fake File Converter Malware | Exploits a common user need to deliver malware or fraudulent services | Read More |
Pornographic Virus Alert from Microsoft | Another common tech support scam that falsely claims system infection and requests phone calls | Read More |
Resource Type | Official Source | URL/Access Method |
---|---|---|
Microsoft Support Website | Microsoft’s official support portal for all products | https://support.microsoft.com |
Microsoft Community Forums | User and expert support community moderated by Microsoft | https://answers.microsoft.com |
Windows Security App | Built-in security center for Windows 10/11 | Access directly through your Windows installation to check for legitimate threats |
Get Help App | Native support application in Windows 10/11 | Available on Windows 10 and 11 systems to connect with official Microsoft support |
Remember that legitimate Microsoft support representatives will never cold-call you or prompt you to call them through browser pop-ups.
The “Error: Ox800VDS” tech support scam represents a sophisticated social engineering attack designed to exploit user trust in Microsoft branding and create panic through fake security alerts. By understanding how these scams operate and recognizing their warning signs, users can avoid falling victim to these deceptive tactics.
The most important defense against tech support scams is awareness. Remember that legitimate tech companies will never use browser pop-ups to warn about security issues or ask you to call a phone number to fix computer problems. If you encounter such messages, safely close your browser using Task Manager and report the scam to appropriate authorities.
As these scams continue to evolve, we’ll update our analysis and recommendations to help users stay protected against these increasingly convincing deceptions.