“Ongoing Phishing Attacks Please Call …” is a deceptive pop-up that displays fake security alerts, which are designed to scare people into calling a remote tech support phone number (+1-855-524-6680).
These Ongoing Phishing Attacks Please Call alerts are shown in such a way as to trick the user into thinking their computer has crashed or that a virus has been detected on the computer. It does this to try and scare the infected user into calling one of the listed numbers in order to receive support. In reality, though, they will only be greeted with people who are trying to sell them unneeded support contracts and services.
The “Ongoing Phishing Attacks” pop-up ads are caused by an adware program, which is distributed through various monetization platforms during installation. When this malicious program is installed, an “Ongoing Phishing Attacks” advertisements will randomly pop-up. The fake “Ongoing Phishing Attacks” pop-up will have this message:
ONGOING PHISHING ATTACK please call +1-855-524-6680 !!! The federal bank security system has detected, that your computer has been breached by a phishing attack on 3rd April 2016. Your bank and credit card details are subject to this attack. Please immediately contact our technical security personal to check your system and perform a full system analysis.Please restrain from using your online banking, perform credit card payments or enter your paypal details on any internet connected device until you have consulted our technical staff.IMMEDIATE RESPONSE REQUIRED Please call our technical security staff
24/7 HELP LINE +1-855-524-6680 (TOLL-FREE)
These “Ongoing Phishing Attacks” are designed to scare you into thinking that your computer is infected so that you will call the number listed in the fake security alert. Once you call the number, the salesperson will try to convince you that your computer has a problem and that you should purchase a support contract to fix it. This is a complete scam and you should not purchase anything from numbers listed in alerts.
You should always pay attention when installing software because often, a software installer includes optional installs, such as this Ongoing Phishing Attacks adware. Be very careful what you agree to install.
Always opt for the custom installation and deselect anything that is not familiar, especially optional software that you never wanted to download and install in the first place. It goes without saying that you should not install software that you don’t trust.
How to remove Ongoing Phishing Attacks pop-up ads (Virus Removal Guide)
This page is a comprehensive guide, which will remove Ongoing Phishing Attacks pop-up ads from your computer and any other adware program that may have been installed during the setup process.
Please perform all the steps in the correct order. If you have any questions or doubt at any point, STOP and ask for our assistance.
STEP 1: Remove Ongoing Phishing Attacks adware with AdwCleaner
STEP 2: Remove Ongoing Phishing Attacks pop-up virus with Malwarebytes Anti-Malware
STEP 3: Double-check for Ongoing Phishing Attacks malware with HitmanPro
(Optional) STEP 4: Remove Ongoing Phishing Attacks pop-ups with Zemana AntiMalware
OPTIONAL: Remove the Ongoing Phishing Attacks pop-up
This step needs to be performed only if the malicious pop-ups will not allow you to close your browser.
STEP 1: Remove “Ongoing Phishing Attacks” adware with AdwCleaner
The AdwCleaner utility will scan your computer and web browser for the adware and unwanted browser extensions, that may have been installed on your computer without your knowledge.
- You can download AdwCleaner from the below link.
ADWCLEANER DOWNLOAD LINK (This link will open a new web page from where you can download “AdwCleaner”)
- Before starting AdwCleaner, close your web browser, then double-click on the AdwCleaner icon.
If Windows prompts you as to whether or not you wish to run AdwCleaner, please allow it to run.
- When the AdwCleaner program will open, click on the “Scan” button as shown below.
AdwCleaner will now start to search for adware and other malicious files that may be installed on your computer.
- To remove the malicious files that were detected in the previous step, please click on the “Cleaning” button.
- AdwCleaner will prompt you to save any open files or documents, as the program will need to reboot the computer to complete the cleaning process. Please do so, and then click on the “OK” button.
When your computer reboots and you are logged in, AdwCleaner will automatically open a log file that contains the files, registry keys, and programs that were removed from your computer.
STEP 2: Remove “Ongoing Phishing Attacks” pop-up virus with Malwarebytes Anti-Malware
Malwarebytes Anti-Malware Free uses industry-leading technology to detect and remove all traces of malware, including worms, Trojans, rootkits, rogues, dialers, spyware, and more.
It is important to note that Malwarebytes Anti-Malware works well and should run alongside antivirus software without conflicts.
- You can download download Malwarebytes Anti-Malware from the below link.
MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a new web page from where you can download “Malwarebytes Anti-Malware Free”)
- Once downloaded, close all programs, then double-click on the icon on your desktop named “mbam-setup” to start the installation of Malwarebytes Anti-Malware.
You may be presented with a User Account Control dialog asking you if you want to run this file. If this happens, you should click “Yes” to continue with the installation.
- When the installation begins, you will see the Malwarebytes Anti-Malware Setup Wizard which will guide you through the installation process.
To install Malwarebytes Anti-Malware on your machine, keep following the prompts by clicking the “Next” button.
- Once installed, Malwarebytes Anti-Malware will automatically start and you will see a message stating that you should update the program, and that a scan has never been run on your system. To start a system scan you can click on the “Scan Now” button.
- Malwarebytes Anti-Malware will now start scanning your computer for malware. When Malwarebytes Anti-Malware is scanning it will look like the image below.
- When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes Anti-Malware has detected. To remove the malicious programs that Malwarebytes Anti-malware has found, click on the “Remove Selected” button.
Please note that the infections found may be different than what is shown in the image.
- Malwarebytes Anti-Malware will now quarantine all the malicious files and registry keys that it has found. When removing the files, Malwarebytes Anti-Malware may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot your computer, please allow it to do so.
After your computer will restart, you should open Malwarebytes Anti-Malware and perform another “Threat Scan” scan to verify that there are no remaining threats
STEP 3: Double-check for the “Ongoing Phishing Attacks” malware with HitmanPro
HitmanPro is a second opinion scanner, designed to rescue your computer from malware (viruses, trojans, rootkits, etc.) that have infected your computer despite all the security measures you have taken (such as anti-virus software, firewalls, etc.). HitmanPro is designed to work alongside existing security programs without any conflicts. It scans the computer quickly (less than 5 minutes) and does not slow down the computer.
- You can download HitmanPro from the below link:
HITMANPRO DOWNLOAD LINK (This link will open a new web page from where you can download “HitmanPro”)
- Double-click on the file named “HitmanPro.exe” (for 32-bit versions of Windows) or “HitmanPro_x64.exe” (for 64-bit versions of Windows). When the program starts you will be presented with the start screen as shown below.
Click on the “Next” button, to install HitmanPro on your computer.
- HitmanPro will now begin to scan your computer for malicious files.
- When it has finished it will display a list of all the malware that the program found as shown in the image below. Click on the “Next” button, to remove malware.
- Click on the “Activate free license” button to begin the free 30 days trial, and remove all the malicious files from your computer.
(Optional) STEP 4: Remove “Ongoing Phishing Attacks” pop-ups with Zemana AntiMalware
- You can download Zemana AntiMalware from the below link:
ZEMANA ANTIMALWARE DOWNLOAD LINK (This link will open a new web page from where you can download “Zemana AntiMalware”)
- Double-click on the file named “Zemana.AntiMalware.Setup.exe” to install Zemana AntiMalware on your computer. When the program starts you will be presented with the start screen as seen below.
Click on the “Next” button, to install Zemana AntiMalware on your computer.
- When Zemana AntiMalware will start, click on the “Scan” button.
- Zemana AntiMalware will now scan computer for any malicious files. This process can take up to 10 minutes.
- When Zemana AntiMalware has finished it will display a list of all the malware that the program found. Click on the “Next” button, to remove the malicious files from your computer.
- Zemana AntiMalware will now remove all the detected malicious files, and at the end a system reboot may be required to remove all traces of malware.
Your computer should now be free of the “Ongoing Phishing Attacks” Support Scam.
If you are still experiencing problems while trying to remove “Ongoing Phishing Attacks” pop-ups from your machine, please do one of the following: