Quincy Credit Union logo

Due to scheduled maintenance:

please be aware that on Sunday, May 19 from 8 am – 1 pm you may not have access to Remote Deposit Capture services. We apologize if this causes any inconvenience.

Malware Scams: A Complete Guide

Illustration of hacker holding laptop with innocent victim unlocking the device to allow access

Malware scams are particularly malicious, as they exploit innocent victims into losing their information and money. Here’s what you need to know about malware scams and how to avoid them.

Oh no! Your computer’s been hacked, and it now has an awful virus. But there’s good news; a helpful caller reached out to you to offer their expert help. The caller may claim to be a representative of the FTC, your bank, or another reputable company, and they’re happy to help restore your device to safety. Just do as they say, and all will be right again. 

Unfortunately, it won’t. If you do follow the caller’s instructions, you’ll be lured into a scam. 

How These Scams Play Out

Malware scams, also known as tech support scams, begin as a seemingly innocent phone call. A scammer reaches out to an individual and informs them that their computer or another device has been hacked. The caller claims that the alleged hacker has gained access to the victim’s computer and can now do all kinds of damage. The scammer claims to be a tech support representative who can help remove any viruses or malware that has been installed. The alleged tech support rep gives clear instructions, often involving giving the caller access to their device. Unfortunately, though, if the victim follows these directions, they’ll actually be installing malware on their computer. 

Red Flags

Avoid malware scams by looking out for these warning signs: 

  • An alleged rep of a tech support company, or the FTC, has called you without you reaching out to them first. 
  • The caller asks you to provide them with remote access to your device so they can remove any malware that has been installed.
  • They claim that your computer has serious damage, even though everything looks untouched from your observations.
  • They urge you to act immediately or risk causing further damage to your device. 
  • The scammer asks you for your credit card or checking account details to pay them for their service or request to be paid via a prepaid gift card.

If You’re Targeted

Anyone can be the target of a malware scam. Take these steps to protect yourself from potential fraud.

First, do not engage with the caller. Hang up as soon possible and block the number. If you’ve started entering information into your computer as per the caller’s instructions, close your device immediately. If you have already given the scammer access to your device, you should immediately consult a genuine tech expert. Be sure to place a fraud alert on any credit cards you may have shared with the scammer or saved on the device and consider freezing your credit to avoid identity theft. Finally, report the scam to the FTC.

If Your Device is Infected

An infected computer may still seem to operate almost normally. Here are some ways to tell if your computer may be infected:

  • It’s running much slower than normal.
  • You’re constantly getting pop-up ads. Most of these are also scams. 
  • Your system abruptly crashes. 
  • You’re suddenly low on disk space.
  • There’s an unexplained increase in internet activity. 

If you notice any of these signs on your computer, bring your device to a tech expert to check for malware.

Don’t get caught in a malware scam! Stay alert and stay safe. 

~

tpw title

tpw content