🚨 The $399 “Support Plan” Scam: How Fake Bookings Are Tricking Businesses and Consumers
It starts with something that looks completely normal.
A booking confirmation.
A receipt.
A familiar brand name like “Norton.”
And before you know it… you’re staring at a $399 charge for something you never intended to buy.
What Happened Here?
Let’s break down what this example shows:
- A booking confirmation through Booksy
- A “Norton 360 PC Premium Protection Plan” purchase
- A charge between $319–$399
- A support phone number included
- A sense of urgency and legitimacy
At first glance, it looks like a routine transaction.
It’s not.
This is a social engineering scam, and it’s getting more sophisticated.
⚠️ The Red Flags You Should Never Ignore
This message contains several classic warning signs:
1. Brand Impersonation
“Norton” is a trusted name—but this is NOT actually from them.
Scammers rely on familiar brands to lower your guard.
2. Suspicious Phone Number
The message pushes you to call support:
📞 +1 (805) 259-5180
This is the trap.
Once you call, they:
- Try to “verify” your system
- Ask for remote access
- Attempt to extract payment or data
3. Vague Product Description
“PC Premium Protection Plan”
No clear licensing details, no official SKU, no vendor validation.
That’s intentional.
4. Urgency + Confirmation Combo
They tell you:
- Your order is confirmed
- It will be activated in 1–2 days
This creates pressure to act quickly before you “lose money.”
5. Unfamiliar Platform Usage
Why is a cybersecurity product being sold through a booking platform?
Because attackers are exploiting trusted platforms to bypass suspicion.
🧠 How This Scam Actually Works
This is not about selling software.
This is about getting you to engage.
Once you:
- Call the number
- Click a link
- Reply to the message
You’ve entered their funnel.
From there, they escalate:
- Remote access scams
- Fake refunds
- Credential theft
- Bank or card fraud
🏢 Why This Matters for Your Business
If this reaches your employees, you now have:
- ❌ Risk of unauthorized remote access
- ❌ Compromised credentials
- ❌ Financial fraud exposure
- ❌ Potential compliance violations
And here’s the uncomfortable truth:
👉 Traditional antivirus will not stop this.
Because this isn’t malware first—it’s human manipulation first.
🔐 What You Should Do Immediately
If you or your team receives something like this:
DO:
- Verify purchases directly through official vendor portals
- Report the message to IT/security immediately
- Educate your team on phishing and social engineering
DON’T:
- Call the number provided
- Click links in the message
- Provide remote access to anyone unsolicited
🛡️ The Bigger Picture: Tools Aren’t Enough
You can have:
- Antivirus
- Firewalls
- Email filters
…and still fall for this.
Because attackers are targeting people, not just systems.
That’s why modern protection requires:
- Security awareness training
- Endpoint detection and response (EDR)
- 24/7 monitoring (MDR)
- Clear internal processes
💡 Final Thought
If it looks legitimate but feels off…
👉 Trust that instinct.
Scammers are counting on you being busy, distracted, or just trusting enough to not question it.
🚀 Call to Action
Don’t wait until a $399 scam turns into a $40,000 breach.
👉 Get a real security strategy in place today.
🌐 www.bitxbit.com
📞 877.860.5831



