PayPal $0.01 USD Scam: What This Tiny Payment Really Means
Written by: Thomas Orsolya
Published on:
A PayPal notification saying someone sent you $0.01 can look harmless. It is only one cent, so most people would not treat it as a serious financial threat.
That is exactly why scammers use it.
The PayPal $0.01 scam uses tiny payments to deliver fake warnings, fake support messages, and alarming claims about pending charges. The goal is not to give you money. The goal is to make you call a scam phone number, click a phishing link, install remote access software, or follow instructions from criminals pretending to be PayPal support.
Scam Overview
The PayPal $0.01 scam is a small-deposit scam where fraudsters send victims a tiny PayPal payment, usually $0.01, and attach a message designed to create fear or confusion.
The sender may appear as a random person, a fake company, a billing department, a refund service, or a name that looks vaguely official. Scammers may change the sender name constantly to avoid easy detection.
In some versions, the payment note claims that a much larger charge is pending. It may mention Coinbase, cryptocurrency, a PayPal debit card, a subscription renewal, a refund confirmation, account verification, or suspicious activity.
A typical scam message may say something like:
“A charge of $987.90 is pending.”
“If you did not authorize this payment, call customer support.”
“This small deposit confirms your account.”
“Your PayPal account has been linked to Coinbase.”
“Suspicious activity detected.”
“Contact PayPal support immediately.”
The $0.01 payment is the bait. The attached message is the real attack.
This scam is more deceptive than a normal phishing email because the alert may appear inside the victim’s real PayPal account activity. That makes the message feel more believable. People are trained to distrust random emails, but they may lower their guard when they see a transaction inside PayPal itself.
Scammers exploit that trust.
A tiny incoming payment does not mean the message is legitimate. PayPal transaction notes can be abused by scammers to place fake warnings, fake phone numbers, and fake instructions in front of victims.
The scam usually has one purpose: to push the victim outside PayPal’s official support system.
If the victim calls the number in the note, they may reach a fake call center. The person answering may claim to work for PayPal, Coinbase, a bank, a fraud department, or a billing company.
The fake agent may say the victim’s account is compromised, a large payment is about to go through, or a hacker has gained access. Then they may ask the victim to install remote access software such as AnyDesk, TeamViewer, UltraViewer, Zoho Assist, RustDesk, or another screen-sharing tool.
That is a major red flag.
PayPal does not need remote access to your device to cancel a payment, review an account, or process a refund.
Once scammers gain remote access, they may try to view your screen, steal login details, see banking information, manipulate browser pages, or pressure you into transferring money. They may claim they are processing a refund, then say they accidentally refunded too much. They may ask you to send the difference back through gift cards, crypto, wire transfer, or payment apps.
Other scammers use the “safe account” trick. They claim your bank account is under attack and tell you to move money to a secure account. There is no secure account. The money goes to the scammers.
The PayPal $0.01 scam may also include phishing links. Instead of a phone number, the note or follow-up message may direct victims to a fake PayPal login page. If the victim enters their email, password, or verification code, scammers can attempt to access the account.
Some versions target Coinbase users or people worried about crypto charges. Others mention fake invoices, subscriptions, Norton, Geek Squad, Microsoft, Apple, or other well-known brands. The wording changes, but the structure remains the same.
A tiny payment is sent. A frightening message is attached. The victim is told to act quickly. The scammer tries to steal money, credentials, or device access.
The scam works because it creates a contradiction. You received money, even if it is only $0.01, so it may not feel like a scam at first. But the message attached to that payment can be dangerous. It may be designed to make you panic about a much larger financial problem.
The safest approach is simple: do not trust phone numbers, links, or support instructions inside unexpected PayPal payment notes.
If there is a real issue with your PayPal account, you can check it by logging into PayPal directly through the official app or website. Do not use links from the message. Do not call numbers listed in transaction notes. Do not install remote access software. Do not send money to cancel a charge. Do not buy gift cards.
The $0.01 payment is not the threat by itself. The scam begins when you react to the fake warning.
How the PayPal $0.01 Scam Works
1. Scammers Send a Tiny PayPal Payment
The scam begins when a fraudster sends a tiny payment, usually $0.01, to a PayPal user.
This amount is intentionally small. It is enough to trigger a notification and appear in PayPal activity, but not enough to make the victim think they have lost money.
That is the trick.
Because the victim receives money rather than loses money, the transaction may not feel dangerous. The victim may simply wonder why a stranger sent them one cent.
This curiosity pushes them to open the transaction and read the note.
2. The Sender Uses a Random Name or Fake Company
The sender may appear as an individual, a company, a support department, or a billing service. The name can change from scam to scam.
Scammers may use:
Random personal names
Fake company names
Crypto-related names
Billing department labels
Refund department labels
Customer support-style names
Compromised PayPal accounts
Do not rely only on the sender name to decide whether the payment is safe. Scammers rotate names constantly.
The suspicious part is the unexpected tiny payment combined with an urgent or alarming message.
3. The Payment Note Creates Panic
The transaction note is the main weapon.
It may claim that a large charge is pending, that your account has been verified for a payment, or that you must contact support if you did not authorize something.
The note may mention:
Coinbase
Bitcoin or crypto purchases
PayPal billing
Unauthorized transactions
Suspicious activity
Refund confirmation
Account verification
Subscription renewal
Fake invoices
Account restrictions
The message is designed to make you think something serious is happening.
For example, the note may say a $987.90 Coinbase charge is pending. The victim received only $0.01, but the note points to a much larger financial threat.
This fear is what drives the next step.
4. The Message Pushes You to Call Fake Support
Many PayPal $0.01 scam messages include a phone number. The note may say to call PayPal support, billing support, Coinbase support, or fraud prevention if you did not authorize the charge.
That phone number is not PayPal.
It connects to scammers.
Phone calls are valuable to scammers because they can pressure victims in real time. A fake support agent can sound calm, professional, and helpful. They can answer questions, repeat official-sounding language, and make the victim feel that the situation is urgent.
The scammer may say:
“Yes, we see suspicious activity.”
“Your account has been compromised.”
“A large payment is pending.”
“A hacker connected your PayPal to Coinbase.”
“We must secure your account immediately.”
“Do not hang up during this process.”
These statements are meant to keep the victim afraid and dependent on the caller.
5. The Scam Turns Into Fake Tech Support
After the victim calls, the scam may shift from a PayPal issue into a fake tech support emergency.
The scammer may claim the victim’s computer or phone is infected. They may say hackers are using the device to access PayPal. They may claim they need to check the device before canceling the charge.
Then they ask the victim to install remote access software.
Common apps abused in these scams include:
AnyDesk
TeamViewer
UltraViewer
Zoho Assist
RustDesk
LogMeIn
ScreenConnect
These apps are legitimate tools when used by real support teams, but scammers use them to view and control a victim’s device.
A real PayPal representative will not ask you to install remote access software to resolve a payment issue.
6. Scammers Ask You to Open PayPal, Email, or Banking Apps
Once remote access is active, scammers may ask the victim to open PayPal, email, online banking, credit card accounts, or Coinbase.
They may claim this is needed to:
Cancel the pending charge
Verify the refund
Check for unauthorized activity
Secure the bank account
Confirm identity
Remove hackers
This is extremely risky.
If the scammer can see your screen, they may capture sensitive information. They may observe account balances, login details, card information, transaction history, email codes, and security prompts.
They may use this information to steal money or prepare future attacks.
7. The Fake Refund Trick May Begin
One of the most common scams after remote access is the fake refund trick.
The scammer pretends to issue a refund, then claims they accidentally refunded too much. For example, they may say they meant to refund $10 but accidentally sent $1,000.
They may use fake pages or screen manipulation to make it look like your bank balance changed.
Then they pressure you to send back the “extra” money.
They may ask for repayment through:
Gift cards
Cryptocurrency
Wire transfer
Bank transfer
Payment apps
Cash deposits
The refund was never real. The “extra money” story is invented to make you send your own money to the scammers.
8. They May Use the Safe Account Trick
Another common method is the safe account scam.
The fake PayPal agent claims your bank account is compromised. They may say hackers are about to drain your account and that your money must be moved to a secure holding account.
This is false.
The so-called safe account belongs to the scammer or someone working with them.
No real PayPal employee, bank worker, or fraud investigator will tell you to move money to a separate account to protect it.
9. Gift Cards May Be Requested
Scammers often ask victims to buy gift cards because gift card codes are fast and hard to recover.
They may say gift cards are needed for:
Verification
Refund processing
Charge cancellation
Security deposits
Account unlocking
Reversing a payment error
This is always a scam.
PayPal will never ask you to buy gift cards to fix an account issue or cancel a transaction.
10. The Scammer Tries to Keep You Isolated
During the call, the scammer may tell you not to contact your bank, PayPal, family, or friends. They may claim the case is confidential or that speaking to anyone could interrupt the refund.
This is a manipulation tactic.
Scammers isolate victims because another person may recognize the scam quickly.
If someone on the phone tells you not to verify the issue independently, treat that as a clear warning sign.
Common Variations of the PayPal $0.01 Scam
Coinbase Pending Charge Version
The note claims a large Coinbase charge is pending. This version uses fear around cryptocurrency transactions, which many people believe are difficult to reverse.
Fake PayPal Support Version
The payment note includes a fake PayPal customer support number. Victims who call are connected to scammers.
Fake Invoice or Subscription Version
The note claims a subscription, invoice, or renewal is pending. It may mention a well-known brand to make the threat seem familiar.
Fake Refund Version
The message claims that the $0.01 payment is connected to a refund confirmation. If the victim calls, scammers may use the over-refund trick.
Fake Company Version
The sender appears as a company or department. The name may be completely fake or designed to resemble a real organization.
Phishing Link Version
Instead of a phone number, the note or follow-up message includes a link to a fake PayPal login page. This is used to steal credentials.
Red Flags of the PayPal $0.01 Scam
Watch for these warning signs:
You receive $0.01 from someone you do not know.
The sender uses a random name or fake company.
The transaction note mentions a large pending charge.
The message references Coinbase, crypto, refunds, invoices, or account verification.
The note includes a phone number for support.
The message says you must act immediately.
The caller claims your device is hacked.
The caller asks you to install AnyDesk, TeamViewer, or similar software.
You are asked to log into your bank while on the call.
You are told to buy gift cards or send crypto.
You are told to move money to a safe account.
You are warned not to contact PayPal or your bank directly.
The clearest red flags are remote access, gift cards, crypto payments, bank transfers, and secrecy.
What To Do If You Receive a PayPal $0.01 Payment
1. Do Not Panic
A suspicious $0.01 payment does not automatically mean your account has been hacked. Scammers often use tiny payments only to deliver fake messages.
Stay calm and verify through official channels.
2. Do Not Call the Number in the Note
If the transaction note includes a phone number, do not call it. Scammers use fake support numbers to move the scam from PayPal into a live phone conversation.
3. Do Not Click Links
Do not click links in the payment note, email notification, text message, or any related message.
Open PayPal directly through the official app or by typing the address into your browser.
4. Check Your PayPal Account Directly
Log into PayPal safely and review your account activity.
Check for:
Unknown outgoing payments
Pending transactions
Linked bank accounts
Linked cards
Automatic payments
Login activity
Account changes
Security alerts
If you do not see a real outgoing charge, the note was likely scare bait.
5. Report the Payment to PayPal
Report the suspicious transaction through PayPal’s official Help Center or Resolution Center.
Include the sender name, transaction ID, amount, message text, phone number, and any links included in the note.
6. Do Not Reply to the Sender
Do not contact the sender directly. Do not ask who they are. Do not send them more information.
If you are unsure whether to refund the $0.01, ask PayPal through official support.
7. Secure Your PayPal Account
Change your PayPal password if anything seems suspicious. Enable two-factor authentication.
Also check your account settings to make sure your email, phone number, linked cards, and linked bank accounts are correct.
What To Do If You Called the Fake Support Number
1. Hang Up Immediately
End the call. Do not continue the conversation, even if the caller sounds professional or threatens that your account will be locked.
2. Do Not Follow Any More Instructions
Do not install apps. Do not open your bank. Do not buy gift cards. Do not send crypto. Do not transfer money.
3. Disconnect Your Device From the Internet
If you installed remote access software, disconnect from WiFi or mobile data. This can stop an active remote session.
4. Remove Remote Access Software
Uninstall any app the caller told you to install, such as AnyDesk, TeamViewer, UltraViewer, Zoho Assist, RustDesk, LogMeIn, or ScreenConnect.
Restart your device after removing it.
5. Change Passwords From a Clean Device
Use another trusted device to change passwords for important accounts.
Start with:
Email
PayPal
Online banking
Credit card accounts
Coinbase or crypto accounts
Password manager
Shopping accounts
Use strong, unique passwords.
6. Contact Your Bank
If you opened your bank account during the call, shared card details, sent money, or bought gift cards, contact your bank immediately.
Use the phone number on the back of your card or inside your official banking app.
Ask them to review your account, block suspicious transactions, replace cards, and add extra security if needed.
7. Report Gift Card Fraud
If you bought gift cards and gave the codes to scammers, contact the gift card company immediately.
Have your receipt and card numbers ready. Ask whether the balance can be frozen.
8. Run a Security Scan
Scan your device with trusted security software. Check for unknown apps, suspicious browser extensions, and recent downloads.
If the scammer had full remote access, consider having the device inspected by a trusted technician.
9. Report the Scam
Report the scam to PayPal. If Coinbase, a bank, or another company was impersonated, report it to them as well.
If money was stolen, report the incident to your local police, consumer protection agency, or cybercrime reporting center.
Is Your Device Infected? Scan for Malware
If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.
Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.
Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android
Run a Malware Scan with Malwarebytes for Windows
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes
Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.
(The above link will open a new page from where you can download Malwarebytes)
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
Malwarebytes will now begin the installation process on your device.
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
On the final screen, simply click on the Open Malwarebytes option to start the program.
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future. If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future. If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Run a Malware Scan with Malwarebytes for Android
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options. This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue. Tap on “Got it” to proceed to the next step. Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue. Tap on “Allow” to permit Malwarebytes to access the files on your phone.
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future. If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.
How to Protect Yourself From PayPal $0.01 Scams
Use these safety rules whenever you receive an unexpected PayPal payment:
Treat unexpected payment notes as untrusted.
Never call phone numbers included in suspicious transaction notes.
Never click links from unexpected PayPal messages.
Use only the official PayPal app or website.
Do not install remote access software for payment disputes.
Do not buy gift cards to cancel payments or process refunds.
Do not send crypto to reverse a transaction.
Do not log into your bank while a stranger is on the phone.
Enable two-factor authentication on PayPal and email.
Use unique passwords for financial accounts.
Report suspicious payments to PayPal.
The safest move is to step away from the message and verify independently.
FAQ
What is the PayPal $0.01 scam?
It is a scam where fraudsters send a tiny PayPal payment, usually $0.01, and attach a fake warning or support message. The goal is to make you call fake support, click a phishing link, or follow instructions that lead to theft.
Why would scammers send me $0.01?
They use the tiny payment to get your attention and place a message inside your PayPal activity. The money is bait. The attached message is the scam.
Can scammers steal my account by sending $0.01?
The payment itself does not give them access. The danger comes if you call them, click links, share information, install remote access software, or send money.
Should I call the number in the PayPal note?
No. Do not call any phone number included in a suspicious PayPal transaction note. Contact PayPal only through the official app or website.
What if the note says a large charge is pending?
Log into PayPal directly and check your account activity. Do not use links or phone numbers from the message.
Will PayPal ask me to install AnyDesk or TeamViewer?
No. PayPal will not ask you to install remote access software to cancel a charge, process a refund, or secure your account.
Should I refund the $0.01?
Do not manually interact with the sender unless PayPal instructs you through official support. Report the suspicious transaction first.
What if I clicked a link?
Close the page, do not enter more information, and change your PayPal password from a clean device. If you entered your password, enable two-factor authentication and contact PayPal.
What if I gave scammers remote access?
Disconnect from the internet, remove the remote access app, change passwords from a clean device, contact your bank if financial accounts were opened, and scan your device.
Can I get my money back if I was scammed?
It depends on how the money was sent and how quickly you report it. Contact your bank, PayPal, card issuer, or gift card company immediately. Fast reporting gives you the best chance.
The Bottom Line
The PayPal $0.01 scam uses a tiny payment to make a fake warning feel more believable. Scammers may use random names, fake companies, fake support numbers, Coinbase claims, refund messages, or account security warnings to trick victims.
The one-cent payment is not the real danger. The real danger is calling the fake number, clicking the fake link, installing remote access software, or sending money under pressure.
If you receive a suspicious $0.01 PayPal payment, do not react through the message. Log into PayPal directly, check your account, report the transaction, and secure your login.
A real PayPal issue can be handled through official PayPal channels. A random $0.01 deposit with an urgent warning is a scam signal.
10 Rules to Avoid Online Scams
Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.
Stop and verify before you click, log in, download, or pay.
Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).
If you already clicked: close the page, do not enter passwords, and run a malware scan.
Keep your operating system, browser, and apps updated.
Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.
If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.
Use layered protection: antivirus plus an ad blocker.
Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.
If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.
Install apps, software, and extensions only from official sources.
Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.
If you already installed something suspicious: uninstall it, restart, and scan again.
Treat links and attachments as untrusted by default.
Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.
If you entered credentials: change the password immediately and enable 2FA.
Shop safely: research the store, then pay with protection.
Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.
If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.
Crypto rule: never pay a “fee” to withdraw or recover money.
Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.
If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.
Secure your accounts with unique passwords and 2FA (start with email).
Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.
If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.
Back up important files and keep one backup offline.
Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.
If you suspect infection: do not connect backup drives until the system is clean.
If you think you are a victim: stop losses, document evidence, and escalate fast.
Move quickly. Speed matters for disputes, account recovery, and limiting damage.
Stop payments and contact: do not send more money or respond to the scammer.
Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
Scan your device: remove suspicious apps or extensions, then run a full malware scan.
Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.
These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.