Remove “Ongoing Phishing Attacks” pop-ups (Support Scam)

“Ongoing Phishing Attacks Please Call …”  is a deceptive pop-up that displays fake security alerts, which are designed to scare people into calling a remote tech support phone number (+1-855-524-6680).
These Ongoing Phishing Attacks Please Call alerts are shown in such a way as to trick the user into thinking their computer has crashed or that a virus has been detected on the computer. It does this to try and scare the infected user into calling one of the listed numbers in order to receive support. In reality, though, they will only be greeted with people who are trying to sell them unneeded support contracts and services.
Ongoing Phishing Attacks Virus

The “Ongoing Phishing Attacks” pop-up ads are caused by an adware program, which is distributed through various monetization platforms during installation. When this malicious program is installed, an “Ongoing Phishing Attacks” advertisements will randomly pop-up. The fake “Ongoing Phishing Attacks” pop-up will have this message:

ONGOING PHISHING ATTACK please call +1-855-524-6680 !!! The federal bank security system has detected, that your computer has been breached by a phishing attack on 3rd April 2016. Your bank and credit card details are subject to this attack. Please immediately contact our technical security personal to check your system and perform a full system analysis.Please restrain from using your online banking, perform credit card payments or enter your paypal details on any internet connected device until you have consulted our technical staff.IMMEDIATE RESPONSE REQUIRED Please call our technical security staff

24/7 HELP LINE +1-855-524-6680 (TOLL-FREE)

These “Ongoing Phishing Attacks” are designed to scare you into thinking that your computer is infected so that you will call the number listed in the fake security alert. Once you call the number, the salesperson will try to convince you that your computer has a problem and that you should purchase a support contract to fix it. This is a complete scam and you should not purchase anything from numbers listed in alerts.

You should always pay attention when installing software because often, a software installer includes optional installs, such as this Ongoing Phishing Attacks adware. Be very careful what you agree to install.
Always opt for the custom installation and deselect anything that is not familiar, especially optional software that you never wanted to download and install in the first place. It goes without saying that you should not install software that you don’t trust.

How to remove Ongoing Phishing Attacks pop-up ads (Virus Removal Guide)

This page is a comprehensive guide, which will remove Ongoing Phishing Attacks pop-up ads from your computer and any other adware program that may have been installed during the setup process.
Please perform all the steps in the correct order. If you have any questions or doubt at any point, STOP and ask for our assistance.

STEP 1: Remove Ongoing Phishing Attacks adware with AdwCleaner
STEP 2: Remove Ongoing Phishing Attacks pop-up virus with Malwarebytes Anti-Malware
STEP 3: Double-check for Ongoing Phishing Attacks malware with HitmanPro
(Optional) STEP 4: Remove Ongoing Phishing Attacks pop-ups with Zemana AntiMalware

If you are using an Apple Mac OS X operating system, please follow this Remove virus from Apple Mac OS X (Pop-up Ads and Adware) guide to remove Ongoing Phishing Attacks pop-up ads

OPTIONAL: Remove the Ongoing Phishing Attacks pop-up

This step needs to be performed only if the malicious pop-ups will not allow you to close your browser.

  1. Open Task Manager by right-clicking the taskbar, and then clicking Start Task Manager. Alternatively to start the Windows Task Manager, you can press Ctrl+Alt+Del and click on Task Manager or simply press on Ctrl+Shift+Esc.
    Start Task Manager
  2. Scroll through the list till you see your web browser’s process and left-click on it once so it becomes highlighted. Once you have selected the browser’s process, click on the End Task button as show in the picture below.
    Close your browser process
  3. Your browser window should now be closed. The next time you open your browser, do not allow the browser to open the last opened page.

Alternatively, if you are using Microsoft Edge or any other browser, you can disconnect your Internet, then open the web browser, navigate away from the malicious web page, then reconnect to the Internet.

STEP 1: Remove “Ongoing Phishing Attacks” adware with AdwCleaner

The AdwCleaner utility will scan your computer and web browser for the adware and unwanted browser extensions, that may have been installed on your computer without your knowledge.

  1. You can download AdwCleaner from the below link.
    ADWCLEANER DOWNLOAD LINK (This link will open a new web page from where you can download “AdwCleaner”)
  2. Before starting AdwCleaner, close your web browser, then double-click on the AdwCleaner icon.
    Start AdwCleaner
    Picture of User Account Control If Windows prompts you as to whether or not you wish to run AdwCleaner, please allow it to run.
  3. When the AdwCleaner program will open, click on the “Scan” button as shown below.
    AdwCleaner Scan button
    AdwCleaner will now start to search for adware and other malicious files that may be installed on your computer.
  4. To remove the malicious files that were detected in the previous step, please click on the “Cleaning” button.
    Remove Ongoing Phishing Attacks adware with AdwCleaner
  5. AdwCleaner will prompt you to save any open files or documents, as the program will need to reboot the computer to complete the cleaning process. Please do so, and then click on the “OK” button.
    AdwCleaner removing adware
    When your computer reboots and you are logged in, AdwCleaner will automatically open a log file that contains the files, registry keys, and programs that were removed from your computer.

STEP 2: Remove “Ongoing Phishing Attacks” pop-up virus with Malwarebytes Anti-Malware

Malwarebytes Anti-Malware Free uses industry-leading technology to detect and remove all traces of malware, including worms, Trojans, rootkits, rogues, dialers, spyware, and more.
It is important to note that Malwarebytes Anti-Malware works well and should run alongside antivirus software without conflicts.

  1. You can download download Malwarebytes Anti-Malware from the below link.
    MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a new web page from where you can download “Malwarebytes Anti-Malware Free”)
  2. Once downloaded, close all programs, then double-click on the icon on your desktop named “mbam-setup” to start the installation of Malwarebytes Anti-Malware.
    Start Malwarebytes Anti-Malware setup
    Picture of User Account Control You may be presented with a User Account Control dialog asking you if you want to run this file. If this happens, you should click “Yes” to continue with the installation.
  3. When the installation begins, you will see the Malwarebytes Anti-Malware Setup Wizard which will guide you through the installation process.
    Malwarebytes Anti-Malware Installer
    To install Malwarebytes Anti-Malware on your machine, keep following the prompts by clicking the “Next” button.
    Malwarebytes Anti-Malware final screen
  4. Once installed, Malwarebytes Anti-Malware will automatically start and you will see a message stating that you should update the program, and that a scan has never been run on your system. To start a system scan you can click on the “Scan Now” button.
    Malwarebytes Anti-Malware Scan Now
  5. Malwarebytes Anti-Malware will now start scanning your computer for malware. When Malwarebytes Anti-Malware is scanning it will look like the image below.
    Malwarebytes Anti-Malware Scanning for Malware
  6. When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes Anti-Malware has detected. To remove the malicious programs that Malwarebytes Anti-malware has found, click on the “Remove Selected” button.
    Remove the malware that Malwarebytes Anti-Malware has detected
    Please note that the infections found may be different than what is shown in the image.
  7. Malwarebytes Anti-Malware will now quarantine all the malicious files and registry keys that it has found. When removing the files, Malwarebytes Anti-Malware may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot your computer, please allow it to do so.
    Malwarebytes Anti-Malware asking to restart PC
    After your computer will restart, you should open Malwarebytes Anti-Malware and perform another “Threat Scan” scan to verify that there are no remaining threats

STEP 3: Double-check for the “Ongoing Phishing Attacks” malware with HitmanPro

HitmanPro is a second opinion scanner, designed to rescue your computer from malware (viruses, trojans, rootkits, etc.) that have infected your computer despite all the security measures you have taken (such as anti-virus software, firewalls, etc.). HitmanPro is designed to work alongside existing security programs without any conflicts. It scans the computer quickly (less than 5 minutes) and does not slow down the computer.

  1. You can download HitmanPro from the below link:
    HITMANPRO DOWNLOAD LINK (This link will open a new web page from where you can download “HitmanPro”)
  2. Double-click on the file named “HitmanPro.exe” (for 32-bit versions of Windows) or “HitmanPro_x64.exe” (for 64-bit versions of Windows). When the program starts you will be presented with the start screen as shown below.
    HitmanPro Installer
    Click on the “Next” button, to install HitmanPro on your computer.
    itmanPro while installing on PC
  3. HitmanPro will now begin to scan your computer for malicious files.
    HitmanPro scanning
  4. When it has finished it will display a list of all the malware that the program found as shown in the image below. Click on the “Next” button, to remove malware.
    HitmanPro detected malware
  5. Click on the “Activate free license” button to begin the free 30 days trial, and remove all the malicious files from your computer.
    Remove malware with HitmanPro

(Optional) STEP 4: Remove “Ongoing Phishing Attacks” pop-ups with Zemana AntiMalware

  1. You can download Zemana AntiMalware from the below link:
    ZEMANA ANTIMALWARE DOWNLOAD LINK (This link will open a new web page from where you can download “Zemana AntiMalware”)
  2. Double-click on the file named “Zemana.AntiMalware.Setup.exe” to install Zemana AntiMalware on your computer. When the program starts you will be presented with the start screen as seen below.
    Zemana AntiMalware English Setup
    Click on the “Next” button, to install Zemana AntiMalware on your computer.
    Zemana AntiMalware Setup
  3. When Zemana AntiMalware will start, click on the “Scan” button.
    Zemana AntiMalware Scan
  4. Zemana AntiMalware will now scan computer for any malicious files. This process can take up to 10 minutes.
    Zemana AntiMalware Detecting malware
  5. When Zemana AntiMalware has finished it will display a list of all the malware that the program found. Click on the “Next” button, to remove the malicious files from your computer.
    Zemana AntiMalware Removal
  6. Zemana AntiMalware will now remove all the detected malicious files, and at the end a system reboot may be required to remove all traces of malware.
    Zemana AntiMalware Reboot

Your computer should now be free of the “Ongoing Phishing Attacks” Support Scam.
If you are still experiencing problems while trying to remove “Ongoing Phishing Attacks” pop-ups from your machine, please do one of the following:

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.