Scam Computer Tune-up Software, Anti-Virus and Repair Services
Computer Fixer Scams, Popup Ads, Anti-Virus Frauds and Other
Computer Services and Repair SCams
You may have been surfing the internet when suddenly a popup ad appears
saying "your computer be infected" or needs to be tuned up or is running slowly,
or some other warning, and instructing you to click there to fix it. Don't!
It is a scam!
How to the scams first appear?
Typically referred to as "Scareware Scams", or PC Support or tech
support scams, these can appear several ways:
- Scareware Popup Scams:
a popup when you are surfing the internet or in
an email, and
- PC Support or tech support scams:
in a phone call in which
telemarketers masquerade as major computer companies, con consumers into
believing that their computers are riddled with viruses, spyware and
other malware, and then charge hundreds of dollars to remotely access
and 'fix' the consumers' computers.
Scareware Popups
One of the most common varieties of scamware is for fake or useless
commercial firewall and registry cleaner software.
- While suring the internet a website displays a pop-up advertisement
windows or banners with text such as:
"Your computer may be infected
with harmful spyware programs. Immediate removal may be required. To
scan, click 'Yes' below." These popups are often designed to look like
they come from the user's operating system when they are actually a
webpage.
- When you click on the ad, your computer becomes infected with
Malware.
Ransomware Scams
So-called 'ransomware' scams work like this.
- While you are visiting a
website, malicious software is installed on your computer, causing it not to
work.
- A 'pop up' box then appears on your computer, telling you that the
computer has been infected.
- The scammer asks you to pay money to download
software to repair the problem.
- If you do so, you give your credit card
number to scammers, who will charge your account for bogus help and may use
your credit card to make other unauthorized charges.
Tech Support Scams
The 'tech support scam' works like this:
- A person receives a call at home
from someone who claims to be a 'tech support specialist' with a well-known
computer or software company.
- The caller says that your computer has been
infected by a malicious virus or spyware. He may use scare tactics, claiming
that your computer will crash or the information on it will be
misappropriated if you don't immediately fix the problem.
- The caller says he
can correct the problem for a fee if you allow him to remotely install
anti-virus software, usually by going to a website to which he sends you.
- Wanting your computer to be fixed, you visit the website and give
him your credit card number.
- Weeks later, you may discover that your account was
charged not only for the supposed software repair 'service,' but also for
other unauthorized transactions.
If you let the caller install a program
onto your computer by visiting his website, you may also find that malware
or spyware has been installed on your computer that allows the fraudster to
drain from your computer private bank account numbers.
How to Avoid Malware
Scam artists try to trick people into clicking on links that will
download malware and spyware to their computers, especially computers that
don't use adequate security software. To reduce your risk of downloading
unwanted malware and spyware:
Immediately take these steps:
- Use antivirus software, and keep it up to date (there are decent
free antivrus packages for home use, too).
- Enable your web browser's (Google Chrome, Internet Explorer, Safari,
Firefox, etc.) phishing protection settings, usually found under "Tools"
or "Preferences" or "Settings."
- Get to know the look of pop up messages from your current AV
software. If you know what you are looking for, you are much harder to
fool. Take note of the name and icon of your anti-virus software and
click on pop ups that only come from that program.
Next steps and precautions
-
Keep your security software
updated.
At a
minimum, your computer should have anti-virus and anti-spyware software,
and a firewall. Set your security software, internet browser, and
operating system (like Windows or Mac OS) to update automatically.
-
Instead of clicking on a link
in an email, type the URL of the site you want directly into your
browser.
Criminals
send emails that appear to be from companies you know and trust. The
links may look legitimate, but clicking on them could download malware
or send you to a spoof site designed to steal your personal information.
-
Don't open attachments in
emails unless you know who sent it and what it is.
Opening
attachments - even in emails that seem to be from friends or family - can install malware on your computer.
-
Download and install software
only from websites you know and trust.
Downloading
free games, file-sharing programs, and customized toolbars may sound
appealing, but free software can come with malware.
-
Minimize "drive-by" downloads.
Make sure your browser security setting is high enough to detect
unauthorized downloads. For Internet Explorer, for example, use the
"medium" setting at a minimum.
-
Use a pop-up blocker and
don't click on any links within pop-ups.
If you do, you may
install malware on your computer. Close pop-up windows by clicking on
the "X" in the title bar.
-
Resist buying software in
response to unexpected pop-up messages or emails,
especially
ads that claim to have scanned your computer and detected malware.
That's a tactic scammers use to spread malware.
-
Talk about safe computing.
Tell
your kids that some online actions can put the computer at risk:
clicking on pop-ups, downloading "free" games or programs, opening chain
emails, or posting personal information.
-
Back up your data regularly.
Whether it's text files or photos that are important to you, back up any
data that you'd want to keep in case your computer crashes.
What happens if your computer has become infected?
If you do click on the popups, the software may:
- Trick you into entering your credit card information or passwords or
personal information.
- Steal your bank account information and empty out your account.
- Send spam messages from your email address.
- Corrupt or destroy your documents.
- Allow other, stronger infections into your computer.
- Crash your computer or slow it to a crawl.
- Infect other computers both on the Internet and on a local network.
- Prompt you for payment to remove the "infection."
What to do if you did click on the popup?
- Close and quit the web browser (Chrome, Internet Explorer, Firefox,
Safari, etc.) immediately.
- Do NOT click on OK or cancel. Even a button that says "close" can be
deceiving.
- Often the pop up window is of the web page so if you close your
browser it will go away.
- Download Malwarebytes
(it is free).
- Then disconnect from the Internet to run a full scan using
Malwarebytes.
- Run a full scan with the anti-virus program (Norton 360, McAffee,
AVG, Avast) installed on your computer.
For your information, the
full scan can take several hours to complete properly.
See this
page for a detailed explanation and steps to follow.
Methods of Reporting Scam Emails to US-CERT
- In Outlook Express, you can create a new message and drag and drop the
phishing email into the new message. Address the message to phishing-report@us-cert.gov and
send it.
- In Outlook Express you can also open the email message* and
select
File >
Properties > Details.
The email headers will appear. You can copy these as you normally copy text
and include it in a new message
tophishing-report@us-cert.gov.
- If you cannot forward the email message, at a minimum, please send the URL
of the phishing website.
* If the suspicious mail in question includes a file attachment, it is safer to
simply highlight the message and forward it. Some configurations, especially in
Windows environments, may allow the execution of arbitrary code upon opening and
viewing a malicious email message.
For more information about phishing, see
this page.
Recommendations- What to do if you are the Victim of a High-Tech Computer
Scam:
If you become a victim of a tech support scam, take the following steps:
- Have your computer inspected by an expert. Scammers may install
spyware or malware on your computer to partially disable the computer's
protective firewalls or antivirus software and drain your computer of
private bank account and other information stored on it.
- Until you are sure that your computer is free of spyware or malware,
don't connect to the Internet.
- Change your computer's password, change the password on your email
accounts, and change the password for any financial accounts, especially
your bank and credit card accounts.
- If you provided your credit card information to the scammer,
promptly contact your credit card company to notify it of the scam and
dispute any inappropriate charges. You may wish to cancel your credit
card to protect against future unauthorized charges.
These scams are crimes. You may file a report with the Federal Bureau of
Investigation, which can be contacted as follows:
- Federal Bureau of Investigation
Minneapolis Office
1501
Freeway Boulevard
Brooklyn Center, MN 55430
(763) 569-8000
www.fbi.gov
You may also wish to file a report with the Federal Trade Commission as
follows:
- Federal Trade Commission
Consumer Response Center
600
Pennsylvania Avenue NW
Washington, D.C. 20580
Toll free:
1-877-382-4357
www.consumer.ftc.gov
And
- Only open email or IM attachments that come from a trusted source
and that are expected
- Use an anti-virus/anti-spam package (we recommend Norton 360 or
Norton Internet Security scan all attachments prior to opening.
Click here to see Norton 360 2013 on Amazon.com .
- Delete the messages without opening any attachments
- Do not click on links in emails that come from people you do not
know and trust, even if it looks like it comes from a company you know.
- Keep your anti-virus software up to date
- Keep your operating system up to date with current security patches.
Click here for an article that describes how to do this.
And please let us know about any
suspicious calls or emails you receive. We look for patterns so that we
can alert the authorities and victims to new scams, before it is too late!
References:
-
Microsoft: Rogueware, roguesaoftware
- Wikiedped
"Sareware"
- FTC
"Malware"
-
MAlwaretips.com - "How to remove malware from pop up support ads"
-
NBC News - "How to avoid the nasty fake antivirus scam It happened to me
and it could happen to you if you aren't careful"
- Norton 360 - Norton 360 2014 - 1 User / 3 Licenses [Old Version]
For a comprehensive list
of national and international agencies to report scams, see this page.