2200 Western Court, Suite 400 Lisle, IL 60532
(888) 351-8324 (TECH)

The “Your PC Is Infected” Pop-Up: How to Recognize a Scam

We’ve all seen this pop-up scam at one time or another. We are going to show you how to recognize a scam such as this. These days, with technology everywhere and information at your fingertips it’s much easier for scammers to play upon people’s behavioral patterns. This is the exact purpose of the, “Your PC is infected” pop-up scam where your screen gets frozen and a pop-up tells you that the only way to fix it is to call a phone number for support. This is so successful because people’s natural inclination is to call and get this fixed immediately. Whatever you do – DO NOT CALL THIS PHONE NUMBER! This actually happened to my uncle a while back and he made the mistake of calling the phone number. The fake support technician then installed a remote access tool on his computer after my uncle let him in. Long story short, they stole about $2500.00 from his bank accounts (since he saved his passwords in his browser) and the cost of reloading his workstation. Below is an example of this scam in action:

 
warning-your-computer-may-be-infected-virus.jpg
Source: https://malwaretips.com/blogs/warning-your-computer-may-be-infected-removal/
 
 
maxresdefault (2).jpgSource: https://www.youtube.com/watch?v=D7iv-P83YAI

 

If you see this message do your best to close the pop-up window or the entire browser if necessary. Sometimes the pages do not let you close them out so if this happens try holding the Ctrl + Alt + Delete keys at the same time to open the task managed and then finding your internet session and ending the task.

 
2016-11-10_143259.png

 

If this does not work try restarting the computer as a last resort. If you tried all these things and you are still experiencing issues – contact your support professional to remove any malware that might be on the computer.

If your company experience issues like these regularly then you will benefit from Managed IT Services designed to safeguard your corporate data and technology assets while giving you visibility into your IT operations. {{cta(‘fa8427ed-5b74-436d-84e2-04d1f9b118fd’)}}

 

 

 

Related:

https://www.systechinfo.com/news/2013/05/13/4-easy-ways-to-keep-your-computer-safe 

https://www.systechinfo.com/news/2015/05/14/crypto-vigilance-teslacrypt-breakdown 

https://www.systechinfo.com/news/2016/04/02/safe-malware-lowdown 

https://www.systechinfo.com/news/2016/03/04/ensure-workstation-performance 

 

 

Leave a reply