The fraudsters pretend to work for an IT company and call their victim on the pretext of there being problems with their computer. They then offer their services to rectify the problem. Finally, the scammers try to make the victim reveal their confidential data, inviting them to visit a certain website or install remote desktop or remote access software.
Once the victim has visited the website or installed the programme, the perpetrators can access their computer remotely and install malware. They then ask for payment for their services. If the victim refuses to pay, they lock the computer.