Spam bombs and tech support scams
Spam bombs and tech support scams
2/10/20252 min read


Recently perpetrators of fraud have been utilizing a method that combines two unrelated but useful tactics. The first is a “spam bomb” attack. A spam bomb is an attack in which a target is flooded with an overwhelming amount of spam messages, typically via email or text messages. The goal is to disrupt the target’s ability to use their inbox or device, make it difficult to find legitimate messages, or even crash their email server. Spam bombs can be initiated by malicious actors who use automated bots or compromised systems to send thousands or millions of unwanted messages in a short period of time.
The second tactic is a “tech support scam”. In this type of scam, a fraudster impersonates a legitimate tech support representative and calls the victim on the phone, claiming they can help with the influx of emails the user has been receiving. (Also known as "vishing" (voice phishing) when done over the phone.)
As you can see, the combination of the two tactics can be very effective. The user is most likely frustrated and since they are experiencing an IT issue, the call from technical support is not unexpected.
So, what does the scammer want?
The scammer’s goal is usually to:
- Gain Remote Access: Convince the victim to install remote desktop software.
- Steal Personal Information: Extract sensitive data, such as passwords or credit card numbers.
- Install Malware: Deploy ransomware or other malicious software.
As you can see, this type of attack is targeted to specific individuals, most likely identified by the attacker as a high value target. So, what can be done about it?
Sadly, a “spam bomb” attack is very difficult to remediate. There are third party applications that can help block some of the unwanted emails but there is no complete solution available.
What can be done to prevent a “tech support scam”?
Again, there is no silver bullet. Your employees are always and will always be your first line of defense. Training your employees to spot these scams can be very effective.
If you wish to learn more about this topic or obtain information on how Cloud Security Solutions can help secure your email, identities and infrastructure, visit our website
Contact US
info@cloudsecurityservices.tech
© 2025. All rights reserved.
Social Media
Submit an Inquiry