Geek Squad Scam: Taking Another Look in 2024

by Jon Lober | NOC Technology

Still a thing: NOC Technology takes a fresh look at the Geek Squad scam email.

We shared about this scam about a year ago when one of our staff received it, and sadly, versions of this malicious email are still alive and well today.


So, let's take a minute to refresh you on the what the scam looks like, and what to do if you fell prey to it.


If you need a crash course on what phishing is and why it matters, you can read our introductory article on phishing before you continue.


Geek Squad renewal email scam: the basics

In general terms, phishing attempts can be either a wide-net or precision attack. A wide-net attack will utilize a more basic approach, with vague terms and broad application in hopes of snagging a few victims. A precision attack will be very targeted in its approach, using key personal information that only applies to one person or a very small set of individuals (like the staff of a small business.


The Geek Squad email scam relies on a broad-based approach. Their hope is that someone less than tech-savvy (who needs services like Geek Squad to navigate their tech) will take the bait.


Here are the specifics.


Our staff member received this email in his personal Gmail inbox titled “Regarding the specifics of your membership” from “Erwliu Verwano.” An invoice with the file name “Membership Purchased #450968409457.jpg” was attached to the email and prominently featured the Geek Squad logo.


Thank you for Choosing our Services. Currently is the expiration date of your personal Geek Squad Care subscription. This Subscription Will Auto-Renew Depending on teh Plan You Selected. Please see the overview of your purchase below. Billed To: Customer ID: DSF4356D8S7F8435D Invoice Number 432385723895345 Product Code: E75R836GR7D8SF43  Product Description: A/C Type: Personal PC


The invoice was for a Geek Squad subscription for protection of a personal Windows computer had been auto-renewed for a total of $419. The invoice notified the staff member that the auto-renew would be charged to his account unless he called the number listed in the invoice within the next 24 hours.


Those kind of high-pressure tactics are unfortunately enough to create panic in our brains. (Don't autodraft $419 from MY account!)


If our staff member would have called, the scammer would have likely picked up the phone and done one of the following:


  • Requested personal information to verify the account
  • Requested username and password information
  • Requested financial information to look up the payment type associated with the account
  • Requested remote access to the user’s computer to verify the type of computer


The scammer would have then used any information or access provided to install malware or directly access the victim’s bank accounts. The scammer could then use the bank information however they wished: to make fraudulent purchases, steal directly from victim’s bank accounts, or infiltrate the victim’s network to identify and attack additional victims. Yikes.


Phishing lures: the methods

Despite being a sloppy scam, a few of the methods that the phisher used could be enough to trick some users. And it is apparently successful enough, because it continues it's deep run into 2024.

  1. Simplicity: Though it might make some people think that the email is a scam, to others the very lack of information in the email might make it feel legitimate. Less information in the email means fewer triggers for wary victims.  
  2. Attached Invoice: The subtle detail of attaching an invoice used a veil of legitimacy to mask the scammers intentions. Since the attachment did not contain any malware, Google’s automated scan indicated that the file was safe to open, adding an additional layer of apparent legitimacy. 
  3. Name and logo well-known companies: The Geek Squad and Best Buy names are synonymous with security and reliability. The scammer’s use of these names and logos played directly to the potential victim’s inherent trust in these companies.
  4. Invoice Details: The scammer included an overwhelming amount of specific information in the invoice. Customer IDs, Invoice Numbers, Product Codes, Charges, Dates, and Devices all conspired to make the invoice seem legitimate in today’s automated market environment.
  5. Passive call to action: The invoice did not directly ask the victim to do anything, so it did not trigger the internal alarms that (should) go off when you receive a pushy email asking for payment. This is perhaps the most sophisticated technique used by the phisher.


Red Flags: how to recognize the Geek Squad Scam

Although the phisher has put some effort into their attempt, this particular email is riddled with errors that should raise red flags for potential victims right out of the gate. Anyone with even rudimentary awareness should be suspicious from the very beginning.




  1. Communication regarding an unsolicited service: In this case, the intended victim knew that he had never purchased services from the Geek Squad, nor noticed any such billing on his bank or credit card statements. Though scammers may try to scare you into thinking that someone else used your card to purchase such a service, your bank account will not lie. If you check your bank account or statements, you can quickly verify whether a purchase has ever been made.
  2. Email sender: Many scammers conceal their identity by spoofing their sender name. In this example, the email would have appeared to have been sent by someone like “Geek Squad Billing Team.” In our case, Erwliu did not even try.
  3. Incorrect grammar: A corporate giant like Best Buy has access to competent writers, editors, and basic spell check. Grammatical errors, awkward phrases, and a willy-nilly approach to capitalization all scream “SCAM.” If it sounds wrong, it probably is.
  4. Unprofessional layout, design, and language: Although this sham invoice is not as bad as others we have seen, close observation reveals that the left margin is not aligned, and the opening paragraph of the invoice is a smaller font size.
  5. No personal identifying information: Everything about this email is generic. It is bcc’d to an anonymous list of potential victims. As a result, the scammer did not include any specific information in the invoice or email—such as the potential victim’s name, address, or email. Could a hacker use these basic details? Absolutely, but in this unsophisticated case, the phisher did not do so.
  6. JPG invoice file format: No legitimate company will send a digital invoice in JPG format. JPG is an image file format and is not intended for documents. Most legitimate invoices will be in PDF format—though even those can be scammed. If you see an attached invoice in JPG, PNG or other image format, the email is almost certainly a scam.


What to do if you get a Geek Squad phishing email.

Combined, these red flags are enough evidence for a recipient to firmly conclude that this email is not legitimate. Our staff member quickly recognized the signs of phishing email, and the phisher ended up with any empty net. 


However, many people still fall for such attacks. People at higher risk for falling for this attack includes people with:

  • limited exposure to phishing attempts
  • no cybersecurity awareness training
  • a legitimate purchase history with the spoofed company—Geek Squad or Best Buy in this case.


Attempts are currently common and often painfully effective. In October 2022, the FTC (Federal Trade Commission) issued an alert to consumers about Geek Squad-related phishing. The FTC asks users to report any fraud and their website makes it simple to do so. Best Buy also requests that you report such emails to them for investigation by calling them at 1-888-237-8289.


Finally, once you have reported the scam. Report the email as phishing to your email service provider.

To summarize, if you encounter such communication:

  1. Never click any links.
  2. Report the email to the relevant parties.
  3. Report the email as phishing to your email provider.
  4. Block the sender.
  5. Permanently delete the email. 


Did you bite? What to do if you fell for the Geek Squad phishing scam.

Uh-oh. You took the bait. You clicked. You called. Now what?

If you paid a scammer through Western Union, MoneyGram, or a debit, credit, or gift card, you should immediately contact the financial institution that facilitated the payment and let them know that it was a fraudulent charge and ask them to reverse the payment or refund your money. If you sent cash through the USPS, you can attempt to intercept your package before the scammer receives it. If they receive the cash, or if you paid in cryptocurrency, you will probably not be able to recover your money.

 

If a scammer has access to your personal information such as your social security number or financial information, visit identitytheft.gov to report the theft and put together a plan to recover your identity.

 

If you gave a scammer your username and password, or suspect that they have remote access to your phone or computer, you should run antimalware software on your computer immediately and seek professional help from a cybersecurity expert.  

 

The FTC maintains a helpful page of advice and resources for anyone that has fallen prey to a phishing scam and provides specific instructions for what to do in your particular dilemma. In many cases, you will have a better outcome if you can respond as quickly as possible to the issue. Act quickly and seek professional assistance if you feel that the issue is beyond your ability to address.

 

clicking a phishing email can make you feel sick
By Jon Lober 28 Oct, 2024
Just a quick refresher— what is email phishing? Phishing is a type of cyberattack where attackers try to trick you into giving away sensitive information—like passwords, credit card numbers, or even access to your business’s network— by pretending to be someone you trust . These emails often look like they’re from legitimate companies, like your bank, a well-known retailer, or even someone within your own organization. The goal? To get you to click on a malicious link or download an attachment that can compromise your system. Sometimes, the emails are obvious fakes, but other times, they can be extremely convincing, making it crucial to stay vigilant.
By Jon Lober 23 Oct, 2024
Looking for weak points could save your business.
what should i do with phishing emails
By Jon Lober 22 Oct, 2024
and w hat if I clicked the link?
More Articles
Share by: