771‑247‑3538 EXPOSED – Scam or Legit? Full Investigation
Written by: Thomas Orsolya
Published on:
If you have seen the phone number 771‑247‑3538 in a text, voicemail, email, pop-up warning, or “support” page, treat it as a red flag. Numbers like this are commonly used in impersonation scams where criminals pose as a trusted company, a bank, a government agency, or “technical support” to pressure people into handing over money or sensitive information.
The most important thing to understand is simple: a phone number by itself is not proof of legitimacy. Scammers can buy toll-free numbers, recycle old numbers, or make a fake number appear on caller ID.
This guide explains the most common ways the 771‑247‑3538 scam is presented, the tricks that make it work, and the exact steps to take if you called, shared information, installed remote access software, or sent money.
Scam Overview
The “771‑247‑3538 scam” is not one single, fixed script. It is a bucket term for multiple fraud patterns that have one thing in common: the scammer wants you to call the number (or stay on the call) so they can control the conversation.
In many reports, 771‑247‑3538 shows up the same way other scam numbers do:
A scary pop-up warning claiming your computer is “locked,” “infected,” or “blocked,” and telling you to call immediately for help
A text message claiming there is fraud on your bank account, a charge on your card, a delivery problem, or a security issue
A voicemail that sounds urgent, often referencing “legal action,” “verification,” or “suspicious activity”
A “support” page reached through an ad, a fake search result, or a misleading link that displays a phone number as the only way to fix the issue
A key reason this works is that toll-free prefixes like 833 are widely used by legitimate businesses. The 833 prefix is part of the North American toll-free system, alongside prefixes like 800, 844, 855, 866, 877, and 888. It looks professional and “company-like” to many people, especially in a moment of stress.
Scammers also rely on the fact that caller ID cannot be trusted. Caller ID spoofing is when someone deliberately falsifies the information that shows up on your caller ID display to disguise who they really are. That is why a call can appear to come from a “support line,” a bank, or even a local number, while the actual caller is somewhere else entirely.
The three big scam families that commonly involve numbers like this
Even when the storyline changes, most scams tied to “call this number” fall into a few repeatable categories.
1) Tech support and pop-up warning scams
This is one of the most common ways victims encounter a toll-free number. You are browsing normally, click a link, or land on a page that triggers a loud, full-screen warning. The page claims your device has a virus, your “Windows Defender” found severe threats, or your computer has been locked for your safety.
The message usually includes:
A countdown timer or flashing “urgent” labels
Repeated instructions to call a toll-free number right now
Claims that closing the page will “damage your system” or “erase files”
A promise that a “certified technician” will fix it in minutes
Microsoft explicitly warns that tech support scams use scare tactics to push people into unnecessary “support,” and it provides a way to report these scams. Microsoft also warns that genuine Microsoft error messages do not include a phone number you should call. That single point is worth remembering because it instantly removes the scammer’s main tool: panic.
These scams often escalate into remote access. The scammer asks you to install software like AnyDesk, TeamViewer, ScreenConnect, or a “support tool.” Once they can control your computer, they can stage fake “evidence,” read your browser and emails, and guide you into making payments.
2) Account, billing, and “fraud prevention” impersonation scams
In this pattern, the hook is an account problem, not a device problem. The message claims:
A charge was made to your account
A new device logged in
A withdrawal or transfer is pending
Your “account will be suspended” unless you verify something
The scammer often impersonates a recognizable brand, but the mechanism is always the same: they want you on the phone so they can push you into revealing verification codes, card details, or login credentials.
Many victims describe the same pressure tactics:
“You must act within 15 minutes.”
“If you hang up, the fraud will complete.”
“We need to verify your identity for your protection.”
Sometimes these scams are paired with a second actor. One person plays “support,” while another plays a “supervisor” or “fraud investigator” to add credibility.
3) Government, taxes, benefits, and legal threat scams
This is the most fear-based family of scripts. The call or voicemail claims:
You owe taxes or fees and will be arrested
Your Social Security number is “suspended” or “compromised”
There is a legal case tied to your identity
You must pay a “fine” immediately to avoid consequences
These scripts are designed to override common sense by making you afraid of delay. The scammer often tells you not to speak to anyone else, not even family, because it is a “confidential investigation.”
How scammers get the phone number in front of you
People often assume they were targeted because the scammer knows something personal. Sometimes that is true, but often it is simpler. Scammers spread phone numbers through high-volume channels that do not require knowing who you are.
Common delivery methods include:
Robocalls to huge lists of numbers
Mass text campaigns
Malicious or low-quality ads that lead to fake “support” pages
Browser notifications from spammy sites that you accidentally allowed
Pop-up pages triggered by shady redirects
Search results that look like help pages but are actually ads or look-alikes
One newer twist is that criminals can sometimes insert fake support numbers into pages in ways that make the page look real at first glance, including via deceptive ads and manipulated search pathways. The goal is to make you think you found “the official number” during a stressful moment.
Why this scam is so effective
A well-run phone scam does not rely on technology alone. It relies on predictable human reactions. The 771‑247‑3538 scam is effective because it combines four levers that work fast:
Authority
Urgency
Fear or greed
Isolation
Once those levers are pulled, many smart people make decisions they would never make in a calm moment.
How The Scam Works
Below is a step-by-step breakdown of how scams tied to “call 771‑247‑3538” typically unfold. Not every victim sees every step, but the structure is remarkably consistent.
Step 1: The hook lands in front of you
The first message is designed to be simple, loud, and emotional.
In a tech support version, the message might look like:
“Threat detected. Your system is at risk.”
“Windows security has blocked your computer.”
“Do not turn off your device. Call support now.”
In a banking or billing version, the message might look like:
“Unusual charge detected. If this wasn’t you, call now.”
“New phone number added to your account.”
“Payment failed. Your account will be locked.”
The hook rarely includes details that can be verified. Instead, it includes a phone number and a demand for immediate contact.
Step 2: The scammer establishes control of the conversation
Once you call, the scammer’s first goal is to keep you on the line.
They will speak quickly, use a confident tone, and ask a few basic questions that feel normal, such as your name, your email, or the “reference number” from the message. This creates the illusion that a real case is already open.
To look legitimate, they may:
Use a professional-sounding script
Claim they can see your account
Mention a “ticket number”
Transfer you to a “senior agent”
This is theater. The goal is to move you from skepticism to cooperation.
Step 3: The scammer triggers urgency and narrows your options
After a short warm-up, the scam becomes urgent.
They will tell you that:
The fraud is “in progress”
Your account is “about to be charged”
The attacker is “still connected”
Your computer is “actively compromised”
You have “minutes” to stop it
Then they narrow your choices. In a real support interaction, you would have multiple safe options: hang up, call back through an official number, visit a branch, log into your account yourself, or wait. Scammers try to remove all of those.
You may hear phrases like:
“Do not hang up or the process will fail.”
“If you call the official line, you will be on hold and the damage will happen.”
“We must complete verification now to secure your funds.”
This is the moment they are trying to steal: your ability to pause and verify.
Step 4: Information harvesting begins
Once you are emotionally invested, the scammer asks for “verification.”
Common targets include:
Full name, date of birth, address
Social Security number or last four digits
Card number and expiration date
Online banking username
One-time passcodes (OTP) sent to your phone
Answers to security questions
Email access, including verification links
A large share of modern fraud is not about stealing your password. It is about stealing the one-time verification code that lets the criminal bypass security. If someone asks you to read them a code that was texted to you, treat that as a major danger signal.
Step 5: The “proof” phase
If you hesitate, the scammer provides fake evidence.
In tech support scams, they may ask you to open Event Viewer, Task Manager, or the Command Prompt. These tools always show some warnings or background processes, even on healthy computers. The scammer points to normal entries and calls them “malware.”
They may also:
Show you a fake “infection scan”
Create a file on your desktop named “HACKED”
Open a web page that “confirms” your IP address is compromised
Run a script that produces scary text output
The objective is not to prove anything. It is to make you stop arguing and start following instructions.
Step 6: Remote access is requested (or demanded)
In many cases, the scam turns into remote access.
The scammer tells you to install a remote support program and enter a code so they can “secure your device.” From their perspective, this is the jackpot.
With remote access, they can:
Watch what you type
Read saved passwords in your browser
Open your email and search for bank messages
Guide you to your banking site while they watch
Change settings, install software, or disable protections
Stage fake screens and fake “refund” portals
If you installed remote access software because of a call tied to 771‑247‑3538, assume the scammer may have seen more than you realize, even if you ended the session quickly.
Step 7: The payment extraction
Once the scammer believes you trust them, they pivot to money.
The payment methods vary, but the logic is always the same: use a method that is fast, hard to reverse, and hard to trace.
Common payment demands include:
Gift cards (Apple, Google Play, Target, Walmart)
Cryptocurrency (Bitcoin or other coins)
Wire transfers
Peer-to-peer payments (Zelle, Cash App, Venmo)
Prepaid debit cards
“Invoice” payments to a fake vendor
In tech support scams, the scammer may claim you need to pay for:
A one-time repair fee
A multi-year support plan
A “security license”
A cleanup service that costs $199, $399, or more
In banking scams, the scammer may claim you must “move” your money to a “safe account.” They may instruct you to transfer funds to a new recipient, withdraw cash, buy crypto, or send money to “verify” your identity.
It is all a lie. Real banks do not ask you to protect your account by sending your money to someone else.
Step 8: The cover-up and repeat attempts
If you pay, scammers often come back.
They may claim:
A second charge happened
The first payment failed
Your “case” requires another fee
You are eligible for a refund, but must pay a “processing” cost
Some operations also run a follow-up “recovery” scam. Someone contacts you later claiming they can recover your lost money for a fee. In many cases, it is the same group trying to take more.
Step 9: The long tail: identity and account fallout
Even if you did not pay, sharing information can cause problems later.
Stolen data can be used to:
Attempt account takeovers weeks or months later
Open new lines of credit
File fraudulent claims or tax returns
Target you with more personalized scams
Sell your data to other criminal groups
This is why response steps matter even if you feel you “caught it in time.”
Common warning signs that the call is a scam
Most phone scams tied to numbers like 771‑247‑3538 include several of these warning signs at once:
You were contacted unexpectedly
The message is urgent and emotional
You are told to call a number immediately
You are warned not to hang up or not to tell anyone
The caller asks for passwords, codes, or remote access
The caller demands payment by gift card, crypto, wire, or instant transfer
The caller gets hostile when you ask to verify through official channels
The “problem” cannot be confirmed when you log into your account directly
If you see these signs, your safest move is to end the contact and verify independently.
What To Do If You Have Fallen Victim to This Scam
If you called 771‑247‑3538, or interacted with someone who directed you to that number, focus on two goals: stop further access and reduce financial and identity risk.
Stop contact and preserve evidence End the call, stop replying, and do not negotiate. Then gather what you can while it is fresh: the phone number used, any “case ID,” screenshots of texts/emails/pop-ups, dates and times of calls, names they used, and any payment receipts or transaction IDs.
If you gave remote access, cut it off immediately Disconnect your device from the internet. If the scammer is still connected, power off the computer. From a different, trusted device, change the password for your primary email account first. Email is often the key to resetting everything else. Remove the remote access tool. If you are not confident you can remove it, use a reputable local repair shop.Trend Micro and Microsoft both warn that fake pop-up warnings pressure users into calling and paying, and they recommend closing the browser and avoiding the phone number shown in the pop-up.
Secure your money first (bank, cards, payment apps) If you gave card details, bank details, or sent money, contact your financial institutions immediately. Ask to lock or replace compromised cards, change online banking credentials, review recent transfers, and open a fraud case. If you paid by gift card, contact the issuer immediately and ask if the balance can be frozen. If you paid through crypto, contact the exchange you used and ask if the transaction can be flagged, even though reversals are rare.
Change passwords and strengthen security Change passwords for any account you discussed, accessed, or mentioned during the scam. Start with email, then banking, then payment apps, then shopping accounts. Use unique passwords for each account and turn on 2FA, ideally using an authenticator app instead of SMS.
Freeze your credit and monitor your reports If you shared identity details (full name, address, date of birth, SSN), take credit protection steps. In the United States, federal law allows consumers to place credit freezes for free and to place one-year fraud alerts for free. Review your credit reports for new accounts, hard inquiries, and address changes you do not recognize. The only website authorized by federal law for free credit reports from the major bureaus is AnnualCreditReport.com.
Report the scam to the right places Reporting creates a record for you and helps agencies track patterns. For identity theft recovery steps and an official report, the U.S. government points consumers to IdentityTheft.gov. You can also report scams and unwanted calls through FTC and FCC resources. The FCC provides guidance on illegal calls, robotexts, and spoofing, and it accepts consumer complaints.
Use these official reporting portals:
Identity theft recovery plan (FTC): https://www.identitytheft.gov/
Microsoft report-a-scam: https://www.microsoft.com/reportascam
FCC caller ID spoofing guide: https://www.fcc.gov/consumers/guides/spoofing
Protect yourself from follow-up scams After you are targeted once, you may be targeted again. Watch for “refund” claims, “recovery” services, or anyone asking for a fee to help you get money back. Do not pay anyone who contacts you out of nowhere claiming they can recover losses.
Reduce future exposure on your phone and devices Let unknown calls go to voicemail. Use your phone’s built-in spam blocking features. Ask your carrier about call filtering tools. Do not click links in unexpected texts. Disable browser notification permissions for sites you do not recognize. Keep your system and browser updated. The FTC also maintains consumer guidance on blocking unwanted calls and reducing robocalls.
If a family member was targeted, handle it calmly Many victims feel embarrassed, especially if money was lost. Blame and shame make recovery harder. Focus on securing accounts, documenting what happened, and teaching one repeatable habit: “I will call back using the official number from the company’s real website or my card.”
How to Remove Unwanted Apps and Malware
If you have accidentally downloaded unwanted programs or malware from a pop-up scam, you can find below a full malware removal guide.
This malware removal guide may appear overwhelming due to the number of steps and numerous programs that are being used. We have only written it this way to provide clear, detailed, and easy-to-understand instructions that anyone can use to remove malware for free. Please perform all the steps in the correct order. If you have any questions or doubts at any point, stop and ask for our assistance.
Browser hijackers, unwanted apps, and adware can infect Windows, Mac, iOS, or Android devices, so we’ve covered below all these operating systems. Depending on which operating system is installed on your device, please click on the operating system icon below and follow the displayed steps.
In this first step, we will manually check if any unknown or malicious programs are installed on the computer. Sometimes adware and browser hijackers can have a usable Uninstall entry that can be used to remove them.
Windows 11Windows 10Windows 8Windows 7
Press the Windows key + I on your keyboard to open the Settings app.
First, open Windows Settings by pressing Windows+I on your keyboard. You can also right-click your Start button and select “Settings” from the list.
In the Settings app, click on “Apps” and then “Apps & features”.
When Settings opens, click “Apps” in the sidebar, then select “Apps & Features”.
Find the malicious program in the list of installed apps and uninstall it.
In Apps & Features settings, scroll down to the app list and search for unknown or suspicious programs. To make things easier, you can sort all installed programs by their installation date. To do this, click “Sort by” and select “Install date”.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. When you find a malicious program, click the three dots button beside it and select “Uninstall” in the menu that appears.
If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.
Follow the prompts to uninstall the program.
In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the malicious program.
Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read them closely.
Press the Windows key + I on your keyboard to open the Settings app.
Press the Windows key + I on your keyboard to open the Settings app. You can also ope the Settings app by clicking the Start button on the taskbar, then select “Settings” (gear icon).
In the Settings app, click on “Apps”.
When the “Windows Settings” window opens, click on “Apps“. By default, it should open “Apps and Features” but if it doesn’t, select it from the list on the left.
Find the malicious program in the list of installed apps and uninstall it.
In Apps & Features settings, scroll down to the app list and search for unknown or suspicious programs. To make things easier, you can sort all installed programs by their installation date. To do this, click “Sort by” and select “Install date”.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. When you find a malicious program, click on it and select “Uninstall” in the menu that appears.
If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.
Follow the prompts to uninstall the program.
In the next message box, confirm the uninstall process by clicking on Uninstall, then follow the prompts to uninstall the malicious program.
Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
Go to “Program and Features”.
Right-click on the Start button in the taskbar, then select “Programs and Features”. This will take you directly to your list of installed programs.
Search for malicious program and uninstall it.
The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find any unknown or suspicious program, then click to highlight it, then click the “Uninstall” button.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.
If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.
Follow the on-screen prompts to uninstall malicious program.
In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall malicious program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
Open the “Control Panel”.
Click on the “Start” button, then click on “Control Panel“.
Click on “Uninstall a Program”.
When the “Control Panel” appears, click on “Uninstall a Program” from the Programs category.
Search for malicious programs and uninstall them.
The “Programs and Features” screen will be displayed with a list of all the programs installed on your computer. Scroll through the list until you find any suspicious or unknown program, then click to highlight it, then click the “Uninstall” button.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program.
If you have checked your computer for malicious programs and did not find any, you can proceed with the next step in this guide.
Follow the on-screen prompts to uninstall malicious program.
In the next message box, confirm the uninstall process by clicking on Yes, then follow the prompts to uninstall malicious program. Make sure to read all of the prompts carefully, because some malicious programs try to sneak things in hoping that you won’t read closely.
If you are experiencing difficulty while attempting to uninstall a program, you can use Revo Uninstaller to completely remove the unwanted program from your computer.
Now that the malicious programs have been removed from your computer, we can proceed with the next step in this guide.
STEP 2: Reset browsers back to default settings
In this step, we will remove spam notifications, malicious extensions, and change to default any settings that might have been changed by malware. Please note that this method will remove all extensions, toolbars, and other customizations but will leave your bookmarks and favorites intact. For each browser that you have installed on your computer, please click on the browsers tab below and follow the displayed steps to reset that browser.
ChromeFirefoxMicrosoft EdgeInternet Explorer
Reset Chrome for Windows to default settings
We will now reset your Chrome browser settings to their original defaults. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.
Open the Chrome menu
In the top-right corner of Chrome, click the three-dot (⋮) icon to open the menu.
Go to Settings
From the menu, select Settings.
Select “Reset settings”
In the left sidebar, scroll down and click Reset settings.
Choose “Restore settings to their original defaults”
Click the Restore settings to their original defaults option.
Confirm the reset
In the dialog that appears, click Reset settings to restore Chrome to its default state. Bookmarks, history, and saved passwords will remain, but extensions will be disabled and temporary data cleared.
Reset Firefox for Windows to default settings
We will now reset your Firefox browser settings to their default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.
Click the three horizontal lines in the top-right corner and then click on “Help”.
Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
Click “More troubleshooting information”.
From the Help menu, click on “More troubleshooting information“.
Click on “Refresh Firefox”
When the “Troubleshooting Information” page opens, click on the “Refresh Firefox” button.
Confirm that you want to reset your browser settings.
To finish the reset process, click on the “Refresh Firefox” button in the new confirmation window that opens.
Click “Finish”.
Firefox will now close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on “Finish“.
Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.
Reset Microsoft Edge to default settings
We will now reset your Microsoft Edge browser settings to their default. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.
Click the three dots in the top-right corner and then click on “Settings”.
In the top right corner, click on Microsoft Edge’s main menu button, represented by three horizontal dots. When the drop-down menu appears, click on “Settings“.
Click on “Reset Settings”.
On the left side of the window, click on “Reset Settings“.
Click on “Restore settings to their default values”.
In the main window, click on “Restore settings to their default values“.
Click “Reset”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset” button. Microsoft Edge will now erase all your personal data, browsing history, and disable all installed extensions. Your bookmarks, though, will remain intact and still be accessible.
Reset Internet Explorer to default settings
We will now reset your Internet Explorer browser settings to their default. You can reset Internet Explorer settings to return them to the state they were in when Internet Explorer was first installed on your computer.
Go to “Internet Options”.
Open Internet Explorer, click on the gear icon in the upper-right part of your browser, then select “Internet Options“.
Select the “Advanced” tab, then click “Reset”
In the “Internet Options” dialog box, select the “Advanced” tab, then click on the “Reset” button.
Click on “Reset”.
In the “Reset Internet Explorer settings” section, select the “Delete personal settings” checkbox, then click on the “Reset” button.
Click on “Close”.
When Internet Explorer has completed its task, click on the “Close” button in the confirmation dialogue box. Close your browser and then you can open Internet Explorer again.
STEP 3: Use Malwarebytes Anti-Malware to remove malware and unwanted programs
In this third step, we will install Malwarebytes to scan and remove any infections, adware, or potentially unwanted programs that may be present on your computer.
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes
Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.
(The above link will open a new page from where you can download Malwarebytes)
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
Malwarebytes will now begin the installation process on your device.
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
On the final screen, simply click on the Open Malwarebytes option to start the program.
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
STEP 4: Use HitmanPro to scan your computer for badware
In this next step, we will scan the computer with HitmanPro to ensure that no other malicious programs are installed on your device.
HitmanPro is a second-opinion scanner that takes a unique cloud-based approach to malware scanning. HitmanPro scans the behavior of active files and also files in locations where malware normally resides for suspicious activity. If it finds a suspicious file that’s not already known, HitmanPro sends it to its clouds to be scanned by two of the best antivirus engines today, which are Bitdefender and Kaspersky.
Although HitmanPro is shareware and costs $24.95 for 1 year on 1 PC, there is no limit on scanning. The limitation only kicks in when there is a need to remove or quarantine detected malware by HitmanPro on your system and by then, you can activate the one-time 30-days trial to enable the cleanup.
Download HitmanPro.
You can download HitmanPro by clicking the link below.
HITMANPRO DOWNLOAD LINK (The above link will open a new web page from where you can download HitmanPro)
Install HitmanPro.
When HitmanPro has finished downloading, double-click on “hitmanpro.exe” (for 32-bit versions of Windows) or “hitmanpro_x64.exe” (for 64-bit versions of Windows) to install this program on your computer. In most cases, downloaded files are saved to the Downloads folder.
You may be presented with a User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
Follow the on-screen prompts.
When HitmanPro starts you will be presented with the start screen as shown below. Click on the “Next” button to perform a system scan.
Wait for the HitmanPro scan to complete.
HitmanPro will now begin to scan your computer for malicious programs.
Click on “Next”.
When HitmanPro has finished the scan, it will display a list of all the malware that it has found. Click on the “Next” button to have HitmanPro remove the detected items.
Click on “Activate free license”.
HitmanPro may now require to activate the free 30-days trial to remove the malicious files. To do this, click on the “Activate free license” button to begin the free 30 days trial and remove all the malicious files from your computer.
When the malware removal process is complete, it will display a screen that shows the status of the various programs that were removed. At this screen, you should click on the Next button and then if prompted you should click on the Reboot button. If HitmanPro does not prompt you to reboot, please just click on the Close button.
STEP 5: Use AdwCleaner to remove adware and malicious browser policies
In this final step, we will use AdwCleaner to remove the malicious browser policies that were set by browser hijackers on your computer and delete malicious browser extensions.
AdwCleaner is a free popular on-demand scanner that can detect and remove malware that even the most well-known anti-virus and anti-malware applications fail to find. This on-demand scanner includes a lot of tools that can be used to fix the side effects of adware. browser hijackers and other malware.
Download AdwCleaner.
You can download AdwCleaner by clicking the link below.
ADWCLEANER DOWNLOAD LINK (The above link will open a new web page from where you can download AdwCleaner)
Double-click on the setup file.
Double-click on the file named “adwcleaner_x.x.x.exe” to start AdwCleaner. In most cases, downloaded files are saved to the Downloads folder.
AdwCleaner program will now open and you will be presented with the program’s license agreement. After you read it, click on the I agree button if you wish to continue. If Windows prompts you as to whether or not you wish to run AdwCleaner, please allow it to run.
Enable “Reset Chrome policies” to remove malicious browser policies.
When AdwCleaner starts, on the left side of the window, click on “Settings” and then enable “Reset Chrome policies“.
Click on the “Scan” button.
On the left side of the AdwCleaner window, click on “Dashboard” and then click “Scan” to perform a computer scan.
Wait for the AdwCleaner scan to finish.
AdwCleaner will now scan your computer for malware. This process can take a few minutes.
Click on “Quarantine” to remove malware.
When the AdwCleaner scan is completed it will display all of the items it has found. Click on the “Quarantine” button to remove the malicious programs from your computer.
Click on “Continue” to remove the malicious programs.
AdwCleaner will now prompt you to save any open files or data as the program will need to close any open programs before it starts to clean. Click on the “Continue” button to finish the removal process.
AdwCleaner will now delete all detected malware from your computer. When the malware removal process is complete, you may be asked to restart your computer.
Your computer should now be free of Unwanted Apps and Malware and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future. If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
Profiles are used by IT admins in businesses to control the behavior of their Macs. These profiles can configure a Mac to do many different things, some of which are not otherwise possible. When it comes to home users, adware and browser hijackers are using the configuration profile to prevent users from removing malicious programs from the computer. This also prevents the user from changing that behavior in the browser’s settings.
In this first step, we will check your computer to see if any configuration profiles are installed. To do this, follow the below steps:
Open “System Preferences”
From the Apple menu, select System Preferences.
Search for “Profiles”
When the System Preferences window opens, search for the Profiles icon.
If there isn’t a Profiles icon, you don’t have any profiles installed, which is normal and you can continue with the next steps.
Remove the malicious profiles
If there’s a Profile icon, click on it and select any suspicious profile that you want to remove, and then press the – (minus) button. Click Remove to remove the profile.
STEP 2: Delete malicious apps
In this second step, we will try to identify and remove any malicious apps and files that might be installed on your computer. Sometimes redirects or adware programs can have usable Uninstall entries that can be used to remove these programs.
Quit the malicious programs
On the Apple menu bar, in the top-right corner, if you see any unknown or suspicious icon, click on it and then select Quit.
Open “Finder”
Click the Finder application on your dock.
Click on “Applications”
In the Finder left pane, click on “Applications“.
Find and remove the malicious app.
The “Applications” screen will be displayed with a list of all the apps installed on your device. Scroll through the list until you find the malicious app, right-click it, and then click “Move to Trash”.
Look out for any suspicious program that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. Here are some known malicious programs: SearchMine, TakeFresh, TopResults, FeedBack, ApplicationEvents, GeneralOpen, PowerLog, MessengerNow, ImagePrime, GeneralNetSearch, Reading Cursors, GlobalTechSearch, PDFOnline-express, See Scenic Elf, MatchKnowledge, Easy Speedtest, or WebDiscover.
Click “Empty Trash”
On the dock, right-click on the trash icon and select “Empty Trash”. Doing so deletes the Trash’s contents, including the program that you just sent to the Trash.
Find and remove the malicious files
Click the desktop to make sure you’re in the Finder, choose “Go” then click on “Go to Folder“.
Type or copy/paste each of the below paths into the window that opens, then click Go.
/Library/LaunchAgents
~/Library/LaunchAgents
/Library/Application Support
/Library/LaunchDaemons
Look out for any suspicious files that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. These are some known malicious files: “com.adobe.fpsaud.plist” “installmac.AppRemoval.plist”, “myppes.download.plist”, “mykotlerino.ltvbit.plist”, or “com.myppes.net-preferences.plist”. When you find a malicious file move it to the Trash.
STEP 3: Reset browsers back to default settings
In this third step, we will remove spam push notifications and malicious extensions, and change to default any settings that might have been changed by malware. For each browser that you have installed on your computer, please click on the tab below and follow the displayed steps to reset that browser.
Safari BrowserChrome for Mac BrowserFirefox for Mac Browser
Remove malicious extensions and settings from Safari
To remove malware from Safari we will check if there are any malicious extensions installed on your browser and what settings have been changed by this malicious program.
Go to Safari’s “Preferences”.
On the menu bar, click the “Safari” menu and select “Preferences”.
Check Homepage.
This will open a new window with your Safari preferences, opened to the “General” tab. Some browser hijackers may change your default homepage, so in the Homepage field make sure it’s a web page you want to use as your start-up page.
Click “Extensions”
Next, click on the “Extensions” tab.
Find and uninstall malicious extensions.
The “Extensions” screen will be displayed with a list of all the extensions installed on Safari. Look out for any suspicious browser extension that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine extension. By default, there are no extensions installed on Safari so it’s safe to remove an extension
Remove spam notifications ads
Click Preferences, click Websites, then click Notifications. Deselect “Allow websites to ask for permission to send push notifications”.
Remove all data stored by websites on your computer.
In the Safari menu, choose “Preferences…”, select “Privacy” at the top of the new window that appears, and then click the “Manage Website Data” button.
In the next dialog box, click “Remove All“. It will ask you if you are sure you want to remove all data stored by websites on your computer. Select “Remove Now” to clear data that could be used to track your browsing.
Empty Safari Caches.
From your Safari menu bar, click Safari and select Preferences, then select the Advanced tab. Enable the checkbox to “Show Develop menu in menu bar“.
From the menu bar select Develop, then click on Empty Caches as seen in the image below.
Remove malware from Chrome for Mac
To remove malware from Chrome for Mac we will reset the browser settings to their default. Doing these steps will erase all configuration information from Chrome such as your home page, tab settings, saved form information, browsing history, and cookies. This process will also disable any installed extensions. All of your bookmarks, though, will be preserved.
Click on the three dots at the top right and go to Settings.
Click on Chrome’s main menu button, represented by three dots at the top right corner. Now click on the menu option labeled Settings as shown by the arrow in the picture below, which will open the basic settings screen.
In the left sidebar, click on the “Reset and Cleanup” option.
In the left sidebar, click on “Reset and clean up“.
Click “Reset settings to their original defaults”.
Now click on the “Reset settings to their original defaults”. link as shown in the image below.
Click “Reset Settings” button.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset Settings” button.
(Optional) Reset Chrome Data Sync.
In case a malicious extension reinstalls itself even after performing a browser reset, you have an additional option to reset the data sync for your browser. To do this, navigate to chrome.google.com/sync and click on the Clear Data button.
Remove malware from Firefox for Mac
To remove malware from Firefox for Mac we will reset the browser settings to its default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.
Go to the “Help” menu.
Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
Click “Troubleshooting Information”.
Next click on the “Troubleshooting Information” option as indicated by the arrow in the image below. This will bring you to a Troubleshooting page.
Click on “Refresh Firefox”
Click the “Refresh Firefox” button in the upper-right corner of the “Troubleshooting Information” page.
Confirm.
To continue, click on the “Refresh Firefox” button in the new confirmation window that opens.
Click on “Finish”.
Firefox will close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on the “Finish“.
Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.
STEP 4: Run a scan with Malwarebytes for Mac to remove malware
In this final step, we will scan the computer with Malwarebytes for Mac to find and remove any malicious programs that might be installed on your Mac.
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your computer should now be free of Unwanted Apps and Malware and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future. If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Remove Unwanted Apps and Malware from Android
Remove Unwanted Apps and Malware from Android
To remove Unwanted Apps and Malware from your phone or tablet, follow these steps:
In this first step, we will check if any malicious apps are installed on your phone. Sometimes browser hijackers or adware apps can have usable Uninstall entries that can be used to remove these apps.
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
Find the malicious app.
The “Apps” screen will be displayed with a list of all the applications that are installed on your phone. Scroll through the list and look out for any suspicious app that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine program. Most often, cyber criminals hide malware inside video or photo editing apps, weather apps, and camera apps.
Uninstall the malicious app
When you find a suspicious or malicious app, tap on it to uninstall it. This won’t start the app but will open up the app details screen. If the app is currently running press the “Force stop” button, then tap on “Uninstall”.
A confirmation dialog should be displayed to confirm you want to uninstall the app, tap on “OK” to remove the malicious app from your phone.
STEP 2: Reset browsers back to default settings
In this second step, we will reset your browser to its default settings to remove spam notifications, unwated search redirects, and restore its factory settings
Resetting the browser settings to their default it’s an easy task on Windows or Mac computers; however, when it comes to Android, this can’t be done directly because it’s not an option built-in into the browser settings. Restoring the browser settings on Android can be done by clearing the application data. This will remove all the cookies, cache, and other site settings that may have been saved. So let’s see how we can restore your browser to its factory settings.
Chrome for AndroidFirefoxOperaSamsung Internet BrowserMicrosoft Edge
Remove malware from Chrome for Android
To reset Chrome for Android to its default settings, follow the below steps:
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
Find and tap on Chrome.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Chrome app, then tap on it to open the app’s details.
Tap “Storage”.
When Chrome’s app info menu is displayed, tap on “Storage“.
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
Tap “Clear all data”.
Tap “Clear all data” to delete all Chrome’s data including accounts, bookmarks, and your settings to reset the default settings.
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
Remove malware from Firefox for Android
To reset Firefox for Android to its default settings, follow the below steps:
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
Find and tap on Firefox.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Firefox app, then tap on it to open the app’s details.
Tap “Storage”.
When Firefox’s app info menu is displayed, tap on “Storage“.
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
Tap “Clear all data”.
Tap “Clear all data” to delete all Firefox data including accounts, bookmarks, and your settings to reset the default settings.
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
Remove malware from the Opera browser
To reset the Opera browser to its default settings, follow the below steps:
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
Find and tap on Opera.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Opera app, then tap on it to open the app’s details.
Tap “Storage”.
When Opera’s app info menu is displayed, tap on “Storage“.
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
Tap “Clear all data”.
Tap “Clear all data” to delete all Opera’s data including accounts, bookmarks, and your settings to reset the default settings.
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
Remove malware from Samsung Internet Browser
To reset the Samsung Internet Browser to its default settings, follow the below steps:
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
Find and tap on Samsung Internet Browser.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Samsung Internet Browser app, then tap on it to open the app’s details.
Tap “Storage”.
When the Samsung Internet Browser’s app info menu is displayed, tap on “Storage“.
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
Tap “Clear all data”.
Tap “Clear all data” to delete all Samsung Internet Browser’s data including accounts, bookmarks, and your settings to reset the default settings.
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
Remove malware from Microsoft Edge for Android
To reset the Microsoft Edge for Android to its default settings, follow the below steps:
Open the “Settings” menu.
Tap on the “Settings” app from your phone menu or home screen.
Tap on “Apps”.
When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
Find and tap on Microsoft Edge.
The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Microsoft Edge app, then tap on it to open the app’s details.
Tap “Storage”.
When the Microsoft Edge’s app info menu is displayed, tap on “Storage“.
Tap “Manage Space”.
Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
Tap “Clear all data”.
Tap “Clear all data” to delete all Microsoft Edge’s data including accounts, bookmarks, and your settings to reset the default settings.
Confirm by tapping “Ok”.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.
STEP 3: Use Malwarebytes for Android to remove malicious apps
In this final step, we will install Malwarebytes for Android to scan and remove malicious apps from your phone or tablet.
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options. This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue. Tap on “Got it” to proceed to the next step. Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue. Tap on “Allow” to permit Malwarebytes to access the files on your phone.
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of Unwanted Apps and Malware and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future. If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
In this first step, we will clean your Safari browser by using the built-in “Clear History and Website Data” feature.
“Clear History and Website Data” allows you to delete the browsing history and website data that is stored on your device. This can include information such as the websites you have visited, your search history, and any data that has been stored by websites you have visited, such as cookies and cache.
Do not tap on the malicious browser window or pop-ups. Instead, tap on the tab icon located in the lower right corner of the screen, as shown in the image below.
Tap the X button on the tab or swipe up to safely close it.
Tap the Settings app.
Toggle on Airplane Mode to temporarily disconnect your phone from the internet and block unwanted access.
Scroll down and tap Safari.
Tap Clear History and Website Data.
Confirm that you want to clear the history and data by tapping “Clear History and Data” in the pop-up window.
While in Safari settings, make sure to toggle on Block Pop-ups and Fraudulent Website Warning.
Tap on Settings in the upper-left corner to return to the main Settings menu.
Toggle Airplane Mode back off to re-connect your phone to the internet.
STEP 2: Delete unwanted apps
In the next step, we will remove any potentially unwanted apps that may be installed on your iPhone. If you have downloaded an app after being redirected to the App Store by suspicious websites, it is recommended to delete it.
On the home screen, tap and hold on the app icon until all of the icons start to wiggle.
Tap the “X” button that appears on the top left corner of the app icon.
Confirm that you want to delete the app by tapping “Delete”.
That’s it, your iPhone should be clean and you can continue browsing the Internet. We recommend that you install an ad blocker like AdGuard [recommended] to block the malicious ads.
If you continue to have malware related issues with your device after completing the above steps, we recommend to take one of these actions:
The phone number 771‑247‑3538 has been reported in connection with “call us now” scams that rely on urgency, impersonation, and pressure. Whether it appears in a pop-up, a text, a voicemail, or a search result, the safest assumption is that it is not a legitimate support channel unless you independently verify it through an official source.
If you already called, shared information, or paid, you still have options. Move quickly, prioritize financial security and email security, freeze your credit when identity information was exposed, and file official reports. Credit freezes and fraud alerts can be placed for free, and free credit reports are available through the official site authorized by federal law.
The most effective long-term defense is repeatable: never trust a phone number that comes from a pop-up, a random text, or a high-pressure message. Verify through official channels first, then act.
Frequently Asked Questions
What happens if I call 771‑247‑3538, even if I do not pay?
Calling is often enough to put you on a “live number” list. Scammers track which numbers pick up, which callers stay on the line, and who sounds worried. That can lead to more calls, more texts, and more targeted scripts.
If you only called and hung up quickly, you still should watch for follow-up attempts. Consider blocking the number and tightening your call filtering settings, but do not assume the problem is over just because you did not send money.
Is every 833 number a scam?
No. The 833 prefix is a toll-free prefix used by real businesses too. The prefix is not the problem.
The red flag is the context. If a number is presented through a pop-up warning, a random text, a robocall, or a message that pressures you to act immediately, treat it as untrusted until you verify it through official channels.
The caller knew my name. Does that mean the call was legitimate?
Not necessarily. Names and phone numbers are commonly exposed through data broker lists, breaches, social media, and marketing databases.
Scammers also “fish” for details by asking leading questions. If a caller says, “I’m calling about your Amazon account,” and you answer, “Yes, I have one,” they have learned something about you without proving who they are.
How do I verify whether a message is real without taking risks?
Use a simple rule: do not use the contact method provided in the message.
Instead, log into your account by typing the official website address yourself, use the phone number printed on the back of your card, or use the number listed inside your official account app. If the issue is real, it will still be real after you verify it independently.
What if a pop-up traps my browser and I cannot close it?
Many fake “security” pages try to make closing difficult. Do not call the number.
On Windows, try Alt + F4 to close the browser window. If that fails, open Task Manager (Ctrl + Shift + Esc) and end the browser task. On Mac, Force Quit the browser from the Apple menu.
Afterward, clear recent browsing data if the page keeps returning. If you are repeatedly redirected, run a reputable malware scan and review browser extensions.
What if I gave them a one-time code from my phone?
Treat it like an emergency.
One-time codes are often used to approve logins, password resets, or new payees. Change the password for that account immediately, review sign-in activity, remove unfamiliar devices, and contact the provider’s fraud department if you see unauthorized actions.
What if I shared my Social Security number?
Place a credit freeze and monitor your credit reports. Also consider placing a fraud alert.
Then review your credit file for new accounts or inquiries you do not recognize. Use the FTC’s IdentityTheft.gov process to generate an official report and a recovery plan tailored to your situation.
Can I get my money back if I paid?
Sometimes, but it depends on the payment method and how fast you act.
Credit and debit card payments may be disputed, especially if you report quickly and the charges are unauthorized. Wire transfers and instant payment apps can be difficult to reverse, but banks sometimes can stop or recall certain transfers if they have not fully settled. Gift cards and cryptocurrency are the hardest, but you should still report immediately.
10 Rules to Avoid Online Scams
Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.
Stop and verify before you click, log in, download, or pay.
Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).
If you already clicked: close the page, do not enter passwords, and run a malware scan.
Keep your operating system, browser, and apps updated.
Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.
If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.
Use layered protection: antivirus plus an ad blocker.
Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.
If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.
Install apps, software, and extensions only from official sources.
Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.
If you already installed something suspicious: uninstall it, restart, and scan again.
Treat links and attachments as untrusted by default.
Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.
If you entered credentials: change the password immediately and enable 2FA.
Shop safely: research the store, then pay with protection.
Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.
If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.
Crypto rule: never pay a “fee” to withdraw or recover money.
Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.
If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.
Secure your accounts with unique passwords and 2FA (start with email).
Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.
If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.
Back up important files and keep one backup offline.
Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.
If you suspect infection: do not connect backup drives until the system is clean.
If you think you are a victim: stop losses, document evidence, and escalate fast.
Move quickly. Speed matters for disputes, account recovery, and limiting damage.
Stop payments and contact: do not send more money or respond to the scammer.
Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
Scan your device: remove suspicious apps or extensions, then run a full malware scan.
Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.
These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.