Remove Cyber Security Warning pop-up virus (Support Scam)

If you are seeing a Cyber Security Warning pop-up, asking you to call a support number, then your computer is infected with an adware program (Rogue.Tech-Support-Scam).
Please ignore these “Cyber Security Warning” alerts and do not call the displayed number because these pop-ups are a scam.

Cyber Security Warning pop-up

The Cyber Security Warning alert is shown in such a way as to trick the user into thinking their computer has crashed or that a virus has been detected on the computer. It does this to try and scare the infected user into calling one of the listed numbers in order to receive support. In reality, though, they will only be greeted with people who are trying to sell them unneeded support contracts and services.

The “Cyber Security Warning” pop-up ads are caused by a malicious program, which is typically bundled with other software that you can download for free from the Internet. When the malicious program is installed, an “Cyber Security Warning” alert will randomly pop-up. The “Cyber Security Warning” pop-up will have this message:

YOUR COMPUTER HAS BEEN LOCKED!

Your computer has been locked due to violation of the cyber security Act of 2016 (SCA 2016, A. 2077) of the United States Of America. Your IP address was used to visit websites containing Virus, Malware, Trojan and Key Logger. Your computer also contains files that has infected with virus. Spam-messages which contains virus were also sent from your computer.

The computer lock is aimed to stop your illegal activity.
To Unlock The Computer Please Call Support At +1-844-245-8878
And Ask For The Activation Key From Our Support Specialist.
Please call our support immediately otherwise all your Files & Data will be deleted from your computer.
You must call the support at +1-844-245-8878 to get your computer unlocked. Please do not attempt to shutdown or restart your computer, doing that may lead to data loss and identity theft as illegal activity has been initiated from your computer without your knowledge or consent, your PC may be infected by malware, thus you are violating the law of Neglectful Use of Personal Computer.
All suspicious files from your computer were transmitted to a special server and shall be used as evidences. Don’t try to corrupt any data or unblock your computer in an unauthorized way.
In order to resolve the situation in an above mentioned way you should call our support immediately. Please call support specialist at Toll Free +1-844-245-8878 And Get Your Computer Unlocked!

A Suspicious Connection Was Trying to Access Your Logins, Banking Details & Tracking Your Internet Activity.
Security Center & Firewall Services are Disabled, Error code 0x8007042c; .
Your TCP Connection Was Blocked by Your Firewall. Your Accounts May be Suspended Until You Take an Action.
Your Personal Information May Have Leaked. IMMEDIATE RESPONSE REQUIRED
Your Hard Disk May Have Trojan Virus! Please Do Not Try to Fix Manually, It May Crash Your Data.
Please Visit Your Nearest Service Center OR Call Help Desk+1-844-245-8878

Customer Service: +1-844-245-8878 (TOLL-FREE)

PLEASE DO NOT SHUT DOWN OR RESTART YOUR COMPUTER, DOING THAT MAY LEAD TO DATA LOSS AND FAILIURE OF OPERATING SYSTEM , HENCE NON BOOTABLE SITUATION RESULTING COMPLETE DATA LOSS . CONTACT ADMINISTRATOR DEPARTMENT TO RESOLVE THE ISSUE.

*IMMEDIATE RESPONSE REQUIRED

Your System32 .net frame work file missing due to some harmful virus, Debug malware error 895-system 32.exe failure. Please contact network administration to rectify the issue. Please do not open internet browser for your security issue to avoid data corruption on your registery of your system. Please contact network administration department at +1-844-245-8878 (TOLL-FREE)
Virus Info: A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determied by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Greece, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.
A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. The Trojan and backdoors are not themselves easily detectable, but if they carry out significant computing or communications activity may cause the computer to run noticeably slowly. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files (computer virus) or otherwise propagate themselves (worm).
A computer may host a Trojan via a malicious program a user is duped into executing files or browsing internet. Please contact network administration department at +1-844-245-8878 (TOLL-FREE)

As you can see, this program was created for the sole purpose of displaying fake Windows alerts in order to scare you into purchasing remote support services. If you are infected with this program, please ignore any alerts that are displayed and do not call the displayed number. To remove this Trojan and any related software, please use the removal guide below.

How to remove Cyber Security Warning pop-ups (Removal Guide)

This page is a comprehensive guide which will remove Cyber Security Warning pop-ups from Windows.
Please perform all the steps in the correct order. If you have any questions or doubt at any point, STOP and ask for our assistance.

To remove Cyber Security Warning pop-ups, follow these steps:
STEP 1: Scan your computer with AdwCleaner
STEP 2: Scan your computer with Malwarebytes Anti-Malware
STEP 3: Scan your computer with HitmanPro
(OPTIONAL) STEP 4: Scan your computer with Zemana AntiMalware
(OPTIONAL) STEP 5: Reset your browser to default settings


(OPTIONAL) Remove the Cyber Security Warning pop-ups

This step is needed if the malicious pop-ups will not allow you to close your browser.

  1. Open Task Manager by right-clicking the taskbar, and then clicking Start Task Manager. Alternatively to start the Windows Task Manager, you can press Ctrl+Alt+Del and click on Task Manager or simply press on Ctrl+Shift+Esc.
    Start Task Manager
  2. Scroll through the list till you see your web browser’s process and left-click on it once so it becomes highlighted. Once you have selected the browser’s process, click on the End Task button as show in the picture below.
    Close your browser process
  3. Your browser window should now be closed. The next time you open your browser, do not allow the browser to open the last opened page.
If you are using an Apple Mac OS X operating system, please follow this Remove virus from Apple Mac OS X (Pop-up Ads and Adware) guide to remove these pop-ups.

STEP 1: Scan your computer with AdwCleaner

AdwCleaner is a free utility, which will scan your computer and web browser for the Cyber Security Warning redirect.

  1. You can download AdwCleaner from the below link.
    ADWCLEANER DOWNLOAD LINK (This link will open a new web page from where you can download “AdwCleaner”)
  2. Before starting AdwCleaner, close your web browser, then double-click on the AdwCleaner icon.
    AdwCleaner Icon
    If Windows prompts you as to whether or not you wish to run AdwCleaner, please allow it to run.
    AdwCleaner UAC
  3. When the AdwCleaner program will open, click on the “Scan” button as shown below.
    AdwCleaner Scan for Adware
    AdwCleaner will now start to search for the Cyber Security Warning adware and other malicious programs.
  4. To remove the malicious files that were detected in the previous step, please click on the “Clean” button.
    AdwCleaner removing malware
  5. AdwCleaner will prompt you to save any open files or documents, as the program will need to reboot the computer to complete the cleaning process. Please do so, and then click on the “OK” button.
    AdwCleaner Restart PC
    When your computer reboots and you are logged in, AdwCleaner will automatically open a log file that contains the files, registry keys, and programs that were removed from your computer. Please review this log file and then close the notepad window.

STEP 2: Scan your computer with Malwarebytes Anti-Malware

Malwarebytes Anti-Malware is a powerful on-demand scanner which will remove the Cyber Security Warning pop-ups from your machine. It is important to note that Malwarebytes Anti-Malware will run alongside antivirus software without conflicts.

  1. You can download download Malwarebytes Anti-Malware from the below link.
    MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a new web page from where you can download “Malwarebytes Anti-Malware”)
  2. Once downloaded, close all programs, then double-click on the icon on your desktop named “mbam-setup” to start the installation of Malwarebytes Anti-Malware.
    Malwarebytes Anti-Malware Icon
    You may be presented with a User Account Control dialog asking you if you want to run this file. If this happens, you should click “Yes” to continue with the installation.
    Windows asking permission to install Malwarebytes
  3. When the installation begins, you will see the Malwarebytes Anti-Malware Setup Wizard which will guide you through the installation process.
    Malwarebytes Anti-Malware Setup Wizard
    To install Malwarebytes Anti-Malware on your machine, keep following the prompts by clicking the “Next” button.
    Malwarebytes Anti-Malware setup wizard
  4. Once installed, Malwarebytes Anti-Malware will automatically start and will update the antivirus database. To start a system scan you can click on the “Scan Now” button.
    Start a scan with Malwarebytes scan
  5. Malwarebytes Anti-Malware will now start scanning your computer for the Cyber Security Warning malware. When Malwarebytes Anti-Malware is scanning it will look like the image below.
    Malwarebytes Anti-Malware scanning for malware
  6. When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes Anti-Malware has detected. To remove the malicious programs that Malwarebytes Anti-malware has found, click on the “Remove Selected” button.
    To remove malware click on the Remove Selected button
  7. Malwarebytes Anti-Malware will now quarantine all the malicious files and registry keys that it has found. When removing the files, Malwarebytes Anti-Malware may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot your computer, please allow it to do so.

STEP 3: Scan your computer with HitmanPro

HitmanPro finds and removes malware, adware, bots, and other threats that even the best antivirus suite can oftentimes miss. It’s designed to run alongside your antivirus suite, firewall, and other security tools.

  1. You can download HitmanPro from the below link:
    HITMANPRO DOWNLOAD LINK (This link will open a new web page from where you can download “HitmanPro”)
  2. Double-click on the file named “HitmanPro.exe” (for 32-bit versions of Windows) or “HitmanPro_x64.exe” (for 64-bit versions of Windows).
    HitmanPro Icon
    Click on the “Next” button, to install HitmanPro on your computer.
    HitmanPro setup process
  3. HitmanPro will now begin to scan your computer for malware.
    HitmanPro scanning for Cyber Security Warning virus
  4. When it has finished it will display a list of all the malware that the program found as shown in the image below. Click on the “Next” button, to remove malware.
    HitmanPro detected malware
  5. Click on the “Activate free license” button to begin the free 30 days trial, and remove all the malicious files from your computer.
    Activate HitmanPro to remove malware

(OPTIONAL) STEP 4: Scan your computer with Zemana AntiMalware

Zemana AntiMalware is a powerful utility which will remove Cyber Security Warning redirect and other malware from your machine.
This step should be performed only if your issues have not been solved by the previous steps.

  1. You can download Zemana AntiMalware from the below link:
    ZEMANA ANTIMALWARE DOWNLOAD LINK (This link will start the download of “Zemana AntiMalware”)
  2. Double-click on the file named “Zemana.AntiMalware.Setup.exe” to start the installation of Zemana AntiMalware.
    Double-click on the Zemana AntiMalware to instal it
    You may be presented with a User Account Control dialog asking you if you want to run this file. If this happens, you should click “Yes” to continue with the installation.
    Zemana AntiMalware UAC
  3. Click on the “Next” button, to install Zemana AntiMalware on your computer.
    Zemana AntiMalware installation
  4. When Zemana AntiMalware will start, click on the “Scan” button.
    Scan computer with Zemana AntiMalware
  5. Zemana AntiMalware will now scan computer for malicious files. This process can take up to 10 minutes.
    Zemana AntiMalware performing a scan
  6. When Zemana AntiMalware has finished it will display a list of all the malware that the program found. Click on the “Next” button, to remove the malicious files from your computer.
    Zemana AntiMalware removing malware
    Zemana AntiMalware will now remove all the detected malicious files, and at the end a system reboot may be required to remove all traces of malware.

(OPTIONAL) STEP 5: Reset your browser to default settings

If you are still experiencing issues with the Cyber Security Warning browser hijacker in Internet Explorer, Firefox or Chrome, we will need to reset your browser to its default settings.
This step should be performed only if your issues have not been solved by the previous steps.

Internet Explorer

You can reset Internet Explorer settings to return them to the state they were in when Internet Explorer was first installed on your PC.

  1. Open Internet Explorer, click on the “gear iconIE Icon Gear in the upper right part of your browser, then click again on Internet Options.
    [Image: Internet Options in Internet Explorer]
  2. In the “Internet Options” dialog box, click on the “Advanced” tab, then click on the “Reset” button.
    [Image: Reset Internet Explorer]
  3. In the “Reset Internet Explorer settings” section, select the “Delete personal settings” check box, then click on “Reset” button.
    [Image: Reset Internet Explorer to its default settings]
  4. When Internet Explorer has completed its task, click on the “Close” button in the confirmation dialogue box. You will now  need to close your browser, and then you can open Internet Explorer again.
    [Image Reset Internet Explorer settings]

Mozilla Firefox

If you’re having problems with Firefox, resetting it can help. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history and open tabs.

  1. In the upper-right corner of the Firefox window, click the Firefox menu button ([Image: Firefox Menu button]), then click on the “Help” ([Image: Firefox Help button]) button.
    Firefox Help button
  2. From the Help menu, choose Troubleshooting Information.
    If you’re unable to access the Help menu, type about:support in your address bar to bring up the Troubleshooting information page.
    Troubleshooting Information in Firefox
  3. Click the “Refresh Firefox” button in the upper-right corner of the “Troubleshooting Information” page.
    Refresh Firefox button
  4. To continue, click on the “Refresh Firefox” button in the new confirmation window that opens.
    Reset Firefox settings to default
  5. Firefox will close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on the “Finish“.

Note: Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.

Google Chrome

Google Chrome has an option that will reset itself to its default settings. Resetting your browser settings will reset the unwanted changes caused by installing other programmes. However, your saved bookmarks and passwords will not be cleared or changed.

  1. Click on Chrome’s main menu button, represented by three horizontal lines ([Image: Chrome's main menu button]). When the drop-down menu appears, select the option labeled Settings.
    Click on Settings
  2. Chrome’s Settings should now be displayed in a new tab or window, depending on your configuration. Next, scroll to the bottom of the page and click on the Show advanced settings link (as seen in the below example).
    Advanced settings Google Chrome
  3. Chrome’s advanced Settings should now be displayed. Scroll down until the Reset browser settings section is visible, as shown in the example below. Next, click on the Reset browser settings button.
    Reset button in Google Chrome
  4. A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue on with the reset process. To complete the restoration process, click on the Reset button.
    Restore Google Chrome to default settings

Your computer should now be free of the Cyber Security Warning pop-ups. You can remove AdwCleaner from your machine, however we recommend that you keep Malwarebytes Anti-Malware and HitmanPro installed and perform regular computer scans.

If you are still experiencing problems while trying to remove Cyber Security Warning redirect from your machine, please start a new thread in our Malware Removal Assistance forum.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment