This Is Kevin From Microsoft –

The Scammer and the Scammer Baiter

Posted on
The scammer steals with fear. The scam baiter fights back with patience, knowledge, and time. In the digital age, the battlefield is not the computer — it is the human mind. -- YNOT!

Once upon a time, a thief needed a gun, a mask, and a fast horse.

Today he needs a headset, a laptop, and an internet connection. Progress.

The old criminal robbed a stagecoach. The modern criminal robs retirement accounts while pretending to be “Kevin from Microsoft Support” with an accent so thick you could spread it on toast.

The tools changed. Human weakness did not.

The modern scam industry is one of the largest criminal enterprises on Earth. Entire buildings full of people sit in fake “support centers” calling Americans, Europeans, Canadians, and Australians all day long. Some operations are small. Others operate like corporations with managers, scripts, payrolls, quotas, and training programs.

Imagine that for a moment. There are people getting performance reviews for stealing from grandmothers.


The First Rule of the Scam

The scammer does not hack the computer first.

He hacks the human being. That is the secret. It is called social engineering.

Hollywood teaches people that cybercrime is about genius programmers smashing keyboards while green code flies across screens. In reality, most scams are psychological operations disguised as technical support.

The victim is manipulated into opening the door voluntarily.

The process usually works like this:


Step 1 — Create Fear

The scammer begins with urgency.

“Your bank account has been compromised.”

“Your Amazon account purchased an iPhone.”

“Your PayPal account sent $1,200.”

“Your Social Security number is under investigation.”

“Hackers from China are inside your computer.”

Fear shuts down rational thought. The brain switches from logic mode into survival mode.

That is why scammers want people scared, embarrassed, rushed, or confused.

A calm person asks questions.

A frightened person obeys instructions.


Step 2 — Establish False Authority

The scammer pretends to represent:

  • Microsoft
  • Amazon
  • PayPal
  • Norton Antivirus
  • Geek Squad
  • The IRS
  • Social Security
  • Your bank
  • Law enforcement

The average person assumes:

“Surely they would not lie about that.”

Oh yes they would.

The modern scammer understands something politicians learned centuries ago:

If you sound confident enough, many people will surrender their judgment voluntarily.


Step 3 — Gain Remote Access

The victim is instructed to install software such as:

  • AnyDesk
  • TeamViewer
  • UltraViewer

Now here is the important part:

These programs are not evil.

Businesses use them every day for legitimate remote support.

But giving a scammer remote access is like handing your house keys to a burglar because he claimed to be the plumber.

Once connected, the scammer can:

  • move the mouse
  • open files
  • install malware
  • steal passwords
  • access banking sites
  • lock the computer
  • spy on activity

And many victims still do not realize what is happening.


Step 4 — The Theater Performance

This is where the scam becomes art.

The scammer opens harmless system logs and declares:

“These are foreign hackers.”

He runs ordinary commands and says:

“Your computer is infected.”

He may type:

tree
netstat
assoc

The victim sees text flying by and assumes:

“This person must be a genius.”

Meanwhile the scammer may know less about computers than a high school Linux hobbyist.

The illusion of expertise is often enough.


Step 5 — The Money Extraction

This is where things become truly absurd.

Victims are told to:

  • wire money
  • buy gift cards
  • send cryptocurrency
  • install banking apps
  • withdraw cash
  • mail envelopes full of money

Gift cards may be the greatest monument to human stupidity ever invented.

Somewhere along the way humanity accepted:

“Yes, naturally the IRS collects taxes through Apple gift cards.”

And yet millions fall for it.

Why?

Because panic destroys critical thinking.


Enter the Scammer Baiter

Then comes the counterattack.

People like Scammer Payback and Kitboga pretend to be victims while secretly operating inside virtual machines, fake banking systems, isolated networks, and controlled environments.

The scammer believes:

“I found another easy victim.”

Instead, he stepped into a digital bear trap.


What the Baiters Actually Do

The public sees comedy.

Underneath is cybersecurity work mixed with psychological warfare.

Scam baiters:

  • waste scammers’ time
  • gather evidence
  • identify call centers
  • record methods
  • warn the public
  • expose scripts
  • sometimes gain access back into scam systems

Many scammers are surprisingly sloppy:

  • reused passwords
  • open remote sessions
  • exposed databases
  • pirated Windows installs
  • weak security
  • shared credentials

Criminal organizations often have terrible internal cybersecurity.

Irony is one of God’s favorite hobbies.


The Reverse Connection Trick

People often ask:

“How do the baiters reverse the connection?”

Usually through:

  • scammer mistakes
  • exposed remote IDs
  • unattended access enabled
  • file transfers
  • social engineering
  • malicious payloads the scammer runs voluntarily
  • preexisting access gathered during investigations

A lot of YouTube editing compresses hours or days into dramatic moments.

Still, the central truth remains:
The scammers themselves often become victims of their own carelessness.


The Real Battlefield Is Psychological

This is the important lesson.

The computer is not the true target.

Your emotions are.

Scammers exploit:

  • fear
  • loneliness
  • greed
  • embarrassment
  • urgency
  • confusion
  • authority bias

They weaponize stress itself.

Modern technology became so complicated that many people cannot distinguish:

  • a real warning from a fake one
  • a legitimate employee from a criminal
  • security from theater

And that confusion is where the predators live.


How To Protect Yourself

1. Never Let Random People Into Your Computer

If someone calls you unexpectedly:

  • do NOT install remote software
  • do NOT read codes to them
  • do NOT give passwords

Ever.

Legitimate companies do not randomly cold-call you demanding remote access.


2. Slow Down

Scammers depend on urgency.

The moment someone says:

“You must act immediately!”

Stop.

Breathe.

Hang up.

Call the company directly using the official number from their website.


3. Never Trust Caller ID

Caller ID can be spoofed easily.

The number on the screen means almost nothing.


4. Gift Cards = Scam

No legitimate government agency, tech company, or bank wants:

  • Apple cards
  • Steam cards
  • Bitcoin
  • Target gift cards

The moment gift cards enter the conversation:
it is almost certainly fraud.


5. Use Separate Passwords

Most people reuse passwords everywhere.

That turns one stolen password into:

  • email compromise
  • bank compromise
  • social media compromise
  • identity theft

Use a password manager.


6. Turn On MFA

Two-factor authentication stops enormous amounts of fraud.

Especially for:

  • email
  • banking
  • cloud accounts

Your email account is the crown jewel. Protect it heavily.


7. Educate Elderly Family Members

Older people are heavily targeted because:

  • they are polite
  • less technical
  • more trusting
  • often isolated

One 20-minute conversation with parents or grandparents can prevent financial disaster.


The Final Irony

The scammer and the scammer baiter are actually mirror images of each other.

Both understand:

  • psychology
  • manipulation
  • technology
  • performance
  • timing

One uses those skills to steal.

The other uses them to expose the theft.

And somewhere in the middle sits ordinary civilization — exhausted, distracted, overloaded with technology, trying to figure out whether the blinking popup on the screen is a legitimate warning or a criminal operation running from a warehouse twelve time zones away.

The digital age did not eliminate the con man.

It industrialized him.


“This Is Kevin From Microsoft”

A  Walk Through a Scam Call

The following is fictional, but every part of it is based on real scam techniques used every day against ordinary people.

The purpose is not to teach crime. It is to show how manipulation works step by step so people recognize it before they become victims.


Scene 1 — The Phone Rings

An elderly man named Frank is sitting at home watching television when the phone rings.

“Hello?”

A calm professional voice answers.

“Good afternoon sir, this is Kevin from the fraud department at Amazon. We detected a suspicious purchase of an Apple iPhone for $1,499 shipping to New Jersey. Did you authorize this purchase?”

Frank immediately feels fear.

“No! No, I didn’t order that!”

The scammer already knows he has emotional control.

Notice something important:

The scammer did not begin by asking for money.

He began by creating panic.


Scene 2 — Creating Urgency

“Sir, your account may have been compromised. We need to secure your banking information immediately before additional charges occur.”

The victim’s brain is now operating emotionally instead of logically.

The scammer continues:

“Do NOT log into your bank yourself right now because the hackers may still be connected.”

This isolates the victim from independent thinking.

Scammers always try to:

  • isolate
  • confuse
  • accelerate
  • overwhelm

Scene 3 — The Remote Connection

The scammer says:

“I’m going to help secure your computer. Please open your browser and type:

www.anydesk.com”

Frank installs AnyDesk.

The scammer asks:

“Please read me the 9-digit code.”

At this exact moment, Frank has effectively handed his house keys to a stranger.

The scammer now controls:

  • the mouse
  • the keyboard
  • the screen
  • possibly files and passwords

Scene 4 — The Theater Performance

The scammer opens a black command window.

Lines of meaningless text appear.

netstat
tree
assoc
ping localhost

Then the scammer gasps dramatically.

“Oh my God.”

Frank becomes terrified.

“What? What is it?”

“Sir… there are foreign IP addresses connected to your computer right now. I believe this may involve organized cybercriminals.”

Frank has no idea what he is looking at.

The scammer could have typed:

“banana monkey refrigerator”

and many victims would still panic because the performance matters more than the content.


Scene 5 — The Fake Refund

This is one of the oldest tricks.

The scammer says:

“We are going to refund the fraudulent charge.”

He opens a fake banking website or manipulates HTML on the screen to make it appear that:

  • $15,000 was transferred instead of $1,500

Frank suddenly sees:

BALANCE: $26,442

Then seconds later:

BALANCE: $41,442

The scammer pretends to panic.

“Oh no. Oh no no no.”

Frank is confused.

“What happened?”

“Sir… I accidentally transferred you TOO MUCH MONEY.”

Now the scammer becomes the “victim.”

This is psychological genius in a dark way.

Frank suddenly stops feeling threatened and begins feeling guilty.


Scene 6 — Emotional Manipulation

The scammer lowers his voice.

“Sir, if my supervisor finds out, I will lose my job.”

Now the criminal becomes sympathetic.

The scammer may say:

  • he has children
  • his mother is sick
  • he will be fired
  • he made an honest mistake

The victim now wants to HELP the scammer.

The emotional reversal is complete.


Scene 7 — The Real Goal

Finally the scammer says:

“The easiest way to return the money is through government-approved secure vouchers.”

Translation:
Gift cards.

Or:
Bitcoin.

Or:
Cash.


The Walmart Trip

The scammer keeps Frank on the phone continuously.

Why?

Because isolation is everything.

If Frank speaks to:

  • a cashier
  • a family member
  • a friend
  • a bank employee

the illusion may collapse.

The scammer says:

“Do NOT tell the store employees this is for refunds. They will become confused because this is part of a federal fraud investigation.”

That line alone should terrify people.

The scammer is actively teaching the victim to lie to normal humans.


Frank drives to Walmart.

The scammer stays on speakerphone the entire time.

“How many gift cards do you see?”

Frank replies nervously:

“Apple cards… Target cards…”

“Good. Buy $2,000 worth.”

The cashier may ask:

“Sir, are these for a scam?”

Frank now repeats the implanted script:

“No no… they’re gifts for my grandchildren.”

The scammer trained him for this moment.


The Bitcoin ATM Version

This one is even darker because cryptocurrency transactions are hard to reverse.

The scammer says:

“The banking system is compromised. The safest way to secure your funds is through the Federal Bitcoin Security Network.”

Which sounds insane to anyone technical.

But remember:
The victim is operating under fear and confusion.

The scammer directs Frank to a Bitcoin ATM at:

  • a gas station
  • convenience store
  • smoke shop

Frank withdraws cash.

The scammer gives him:

  • a QR code
  • a wallet address

Frank feeds thousands of dollars into the machine.

Within minutes: the money is gone forever.


The Cash Mailing Version

Yes, this really happens.

The scammer tells victims:

  • wrap cash in aluminum foil
  • place it in magazines
  • hide it in boxes

Then:

  • UPS
  • FedEx
  • couriers
  • money mules

pick it up.

Sometimes elderly people mail:

  • $20,000
  • $50,000
  • entire life savings

to complete strangers.


Why Victims Fall For It

People ask:

“How can someone be so stupid?”

That is the wrong question.

The correct question is:

“How does fear change human behavior?”

Under stress:

  • logic narrows
  • urgency increases
  • authority becomes persuasive
  • embarrassment prevents people from asking for help

And many victims are:

  • lonely
  • grieving
  • elderly
  • exhausted
  • technologically overwhelmed

The scammers know this.

Predators always study weakness.


The Scammer Baiter

This is where people like Scammer Payback step in.

They pretend to be Frank.

Except:

  • the bank account is fake
  • the computer is virtualized
  • the files are decoys
  • the panic is theater

The scammer believes:

“I found another victim.”

Meanwhile the baiter is:

  • recording evidence
  • tracing operations
  • wasting hours of scammer time
  • identifying infrastructure
  • exposing methods publicly

Sometimes the baiter even reverses the psychological pressure:
making the scammer angry, frustrated, confused, or careless.

The hunter becomes the hunted.


The Real Lesson

The scam was never about computers. It was about human psychology.

The remote software is merely the rope.

Fear is the hook. Urgency is the bait. Isolation is the trap.

And money — whether through gift cards, Bitcoin, wire transfers, or envelopes of cash — is always the final destination.

The scammer’s real product is not technology.

It is emotional control.

 


© 2025 insearchofyourpassions.com - Some Rights Reserve - This website and its content are the property of YNOT. This work is licensed under a Creative Commons Attribution 4.0 International License. You are free to share and adapt the material for any purpose, even commercially, as long as you give appropriate credit, provide a link to the license, and indicate if changes were made.

How much did you like this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

Visited 4 times, 4 visit(s) today


Leave a Reply

Your email address will not be published. Required fields are marked *