McAfee “Cancellation Request” Email Scam: What You Need to Know

The internet can be a dangerous place, and one of the most common online threats comes in the form of phishing emails designed to steal your personal information. Recently, a new scam has emerged involving fake renewal and cancellation emails allegedly from McAfee.

This detailed guide will provide an in-depth look at how the McAfee cancellation request email scam works, how to identify these malicious emails, and most importantly, what you should do if you receive one or already fell victim.

mcafee

Overview of the McAfee Cancellation Request Scam

The McAfee cancellation request scam starts with an email claiming to be from McAfee regarding an automatic subscription renewal. The email will include fake invoices with made up details like a subscription ID, renewal date, and amount due.

Here is how the scam email might look

Dear Valued Customer,

This is a notice that your McAfee subscription is about to expire. According to our records, your account will be automatically renewed in the next 12 hours for another year at the current subscription rate of $99.99.

Payment Method: Visa ending in 1234
License Quantity: 5
Validity: 1 year

If you did not authorize this purchase, please contact our billing department immediately at [phone number] to cancel the auto-renewal. If no action is taken, the subscription amount will be automatically deducted from your bank account within the next 12 hours.

To avoid any service interruption, we recommend calling our toll-free number as soon as possible to cancel this transaction. We appreciate your business and hope you choose to renew your McAfee protection plan.

Thank you,
The McAfee Billing Team

The goal is to make victims believe they are being charged for a McAfee subscription without consent. The email urges the recipient to call a provided toll-free number to cancel the unauthorized renewal and avoid being charged.

However, the reality is that the email is not from McAfee at all. It is a scam designed to steal money and personal information from unsuspecting victims.

The toll-free numbers in these fake McAfee emails lead to fraudulent “tech support” call centers. When victims call, scammers pose as McAfee support technicians and use social engineering tactics to gain remote access to the victim’s computer.

Once connected remotely, the scammers can install malware, steal sensitive data, and ultimately demand payment to “fix” nonexistent issues discovered on the victim’s computer.

How the McAfee Cancellation Request Scam Works

The McAfee cancellation request scam is quite sophisticated and designed to take advantage of unsuspecting victims. Here is a step-by-step look at how this scam typically operates:

Step 1: Victims Receive a Phishing Email

The scam starts with an email sent to the victim’s inbox. The sender address is spoofed to appear as if it is from McAfee. The email will include the McAfee logo and corporate branding to add legitimacy.

The subject line often says something like “Cancellation Request for Your McAfee Subscription” or “Your McAfee Subscription Renewal Receipt”.

The email body contains a message urging the recipient to call a toll-free number to cancel an unauthorized auto-renewal of their McAfee subscription. Details like the renewal date, invoice number, subscription ID, and amount charged are included to sound official.

Of course, the renewal and billing information is completely fabricated with the intent to deceive.

Step 2: Victims Call the Fake Support Number

When a victim calls the toll-free number provided in the phishing email, the call is routed to a fraudulent “tech support” center. These scammers operate boiler room call centers designed to impersonate legitimate companies like McAfee.

The scammers who answer the phone falsely claim to be affiliated with McAfee and tech support. Their goal is to gain the trust of the caller and set up a fake problem with their computer that needs fixing.

Step 3: Scammers Instruct Victims to Allow Remote Access

Once on the phone with a victim, the scammers pretend to look up the supposed auto-renewal in question. They will confirm that there does appear to be an unauthorized McAfee subscription linked to the victim’s name and computer.

The scammers then instruct the victim that they will need remote access to the computer to cancel the fake subscription and reverse any bogus charges. This is a key step in the scam, as remote access allows the criminals to take full control of the device.

Popular remote access tools used in these scams include AnyDesk, TeamViewer, UltraVNC, and LogMeIn. The scammers convince victims to download the software and provide the scammer with the ID code to connect.

Step 4: Criminals Trick Victims into Paying for Fake Services

With remote access to the victim’s computer, the criminals can now deploy their endgame: extorting money from the victim.

They will pretend to run diagnosis tests and scans that inevitably discover serious issues like viruses, malware, or hacking attempts. Of course, none of this is real, but it provides the scammers an opportunity to demand payment to repair the fake problems.

Common tactics include:

  • Pretending to discover malware or ransomware and charging a fee to remove it
  • Claiming the victim’s data is at risk and must be backed up for a price
  • Scaring the victim into paying for unnecessary anti-virus software
  • Getting the victim to pay recurring fake support or warranty fees

The scammers often direct victims to purchase gift cards from places like Amazon or iTunes and read the redemption code over the phone. This allows the criminals to quickly get cash value while remaining anonymous.

Step 5: Criminals Steal Personal Information and Money

Beyond demanding direct payments for fake services, the scammers use their remote access to steal personal information and money from the victim’s computer.

With full control over the device, the criminals can:

  • Access and download sensitive files like tax returns and financial statements
  • Install keylogger malware to record passwords and banking logins
  • Use access to bank websites to transfer funds out of accounts
  • Get into email accounts to compromise other online accounts or exploit contacts
  • Hold files for ransom by encrypting data and demanding a decryption fee

Ultimately, the scammers leverage the remote access to not only charge victims for bogus services, but also secretly steal personal information, financial account access, and anything else of value.

What to Do If You Receive a Fake McAfee Cancellation Email

If you receive an email claiming to be from McAfee about an unauthorized subscription renewal, do not call the phone number provided. Here are the steps you should take:

  • Forward the suspicious email to spam@uce.mcafee.com. This allows McAfee to review the phishing attempt and strengthen email security protocols.
  • Report the scam email to the Federal Trade Commission at ReportFraud.ftc.gov. The more scam emails reported, the better chances of catching the criminals.
  • Delete the scam email immediately without opening any links or attachments. The email itself can contain malware.
  • Run a scan using legitimate antivirus software like real McAfee or Malwarebytes to check for viruses or other malware just in case.
  • Change passwords on all online accounts, especially email, financial, and ecommerce sites. Reused passwords can give scammers access if they phish login credentials. Enable two-factor authentication wherever possible for extra protection.
  • Contact your bank and financial institutions if you provided any sensitive information over the phone to the scammers that could compromise your accounts. They may help protect your assets.
  • Learn how to identify phishing emails by looking for warning signs like grammatical errors, suspicious links, false urgency, request for sensitive information, spoofed sender addresses, and threats regarding your accounts.

What to Do If You Already Fell Victim to the Scam

If you already called the phone number in one of these fake McAfee emails and fell victim to the support scam, remain calm and take these steps immediately:

  • If you paid any amount via gift cards, contact the merchant support line to report fraudulent activity and request a refund. Provide any relevant gift card numbers and transaction details.
  • Call your bank and financial institutions to freeze accounts compromised by the scammers. Monitor closely for fraudulent activity and work with your bank’s fraud department to dispute unauthorized transactions or transfers.
  • Change online account passwords a second time if accessed by the scammers. Enable enhanced security options like multi-factor authentication. Remove any unauthorized linked accounts added by criminals.
  • Perform a factory reset on your computer to wipe it clean and remove any malware installed remotely. Reinstall your operating system for a clean slate protected by a new password. Restore personal data only from a known, trusted backup.
  • Cancel any recurring payments or services tricked into during the scam. Notify your credit card provider of the fraudulent charges for assistance with disputes. Freeze accounts if identity theft is suspected.
  • File detailed police reports regarding the technical support scam both locally and with federal authorities. Provide any information collected like phone numbers called, gift card details, or email addresses used by the scammers. This creates an official case should the criminals ever be caught.
  • Be vigilant about checking financial statements, credit reports, and account activity moving forward. Extended fraud monitoring services are a good idea after a scam compromises your personal information and computer access.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

FAQ on the McAfee Cancellation Request Email Scam

What is the McAfee Cancellation Request Email Scam?

This is a phishing scam where recipients receive an email claiming to be from McAfee stating that their subscription is expiring. The email urges the recipient to call a phone number to cancel an unauthorized auto-renewal. However, the email is fake and the number leads to a fraudulent “tech support” center.

How does the McAfee cancellation email scam work?

The scam starts with an email pretending to come from McAfee. It includes fake subscription details and a number to call. When victims call this number, they reach scammers posing as McAfee support. The scammers gain remote access to the victim’s computer and then use various tactics to steal money or data.

What are signs the email is a scam?

Warning signs include grammatical errors, urgency to call the number, threats about your account, spoofed sender addresses, or requests for sensitive information. Legitimate businesses don’t ask customers to call about account issues.

What should I do if I get a suspicious McAfee email?

Do not call the number in the email. Forward the scam email to spam@uce.mcafee.com to report it. Delete the email and scan your device for malware. Also change account passwords, enable two-factor authentication, and monitor financial statements.

What if I already called the number and got scammed?

If you provided gift card numbers, contact the merchant to request a refund. Freeze accounts accessed during the scam and monitor credit reports. Perform a factory reset on your device to remove any malware installed. Cancel any fraudulent payments or services. File police reports regarding the scam.

How can I avoid this scam in the future?

Be wary of any email requesting you to call a number regarding an account issue. Verify the sender address is legitimate. Keep software updated and use strong, unique passwords for all accounts. Learn to identify phishing techniques like urgency, threats, spoofed addresses, etc.

The Bottom Line

The McAfee cancellation request email scam preys upon innocent victims by impersonating a trusted software security company. If you receive a suspicious email regarding an unauthorized McAfee subscription renewal, do not call the provided number or click any links.

These scams can lead to stolen money, compromised accounts, and even malware or ransomware. But by understanding common phishing techniques and acting quickly if scammed, you can limit the damage and avoid becoming an easy target in the future.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment