Beware Of “Your Google Account Has Been Locked!” Pop-ups

The internet is filled with threats looking to take advantage of unsuspecting users. One such threat is the “Your Google Account Has Been Locked!” pop-up scam. This fraudulent pop-up claims your Google account has been locked and that you must call a provided number to unlock it.

However, this is a complete scam designed to trick victims into giving up personal information and money. Read on to learn everything you need to know about recognizing, avoiding, and recovering from the “Your Google Account Has Been Locked!” scam.

Your Google Account Has Been Locked Scam

Scam Overview: What is “Your Google Account Has Been Locked!”

The “Your Google Account Has Been Locked!” scam is a specific type of online scam known as a tech support scam. Tech support scams work by deceiving victims into believing there is a problem with their computer that requires immediate technical assistance.

Scammers pose as technology support staff from trusted companies like Apple, Microsoft, or in this case, Google. They then fool targets into paying for fake support services that actually install malware or gain remote access to personal devices.

Scam Content

The “Your Google Account Has Been Locked!” scam surfaces through malicious pop-ups on infected websites. The scam pop-up says that your Google account has been locked, often citing suspicious activity or security threats.

An example message reads:

“Your Google Account has been locked! Due to recent visiting unsecured sites, Immediately call Google Support +1(805)-259-3677 to unlock it!.”

If the pop-up is closed, the website background page loads a similar urgent message:

“Google ACCOUNT SUSPENDED. Your Google Account has been disabled! Due to recent visiting unsecured sites, your personal data including your banking details, photographs on this device might be stolen via phishing pages. In case it happens, they can access all others Google devices linked to this Google Account are vulnerable. Your device may be permanently blocked today if no action is taken. Immediately call Google Support +1(805)-259-3677 to unlock it!.”

This background page includes a “Call Google Support” button to further urge victims to phone the number.

The content preys on fears of compromised accounts, stolen data, and device blocking. But rest assured, these claims are completely fabricated by scammers.

Scam Tactics

Beyond urgent threats, the scam leverages other psychological tactics to manipulate victims, including:

  • Social proof – Implies many others have called the number, so it must be legitimate.
  • Reciprocity – Makes victims feel obligated to call the number that claims to be helping them.
  • Authority – Pretends to be official Google support, trademarked logos further this appearance.
  • Scarcity – Suggests accounts or devices will be compromised imminently if no action is taken.

Combined, these tactics instill panic and a sense of urgent duty to comply with scam demands.

Scam Goal

The ultimate goal of “Your Google Account Has Been Locked!” is gaining remote access to victim devices. By phoning the scam number, victims will be connected to a fake “support representative” who convinces them to download screen sharing software. From there, the scammer can:

  • Access sensitive account info and data
  • Install malware like keyloggers to harvest future data
  • Encrypt files and demand ransomware payment
  • Enroll devices in botnets for distributed denial of service (DDoS) attacks
  • Resell access to devices on dark web markets

In short, this scam aims to manipulate users into surrendering control of personal devices and data.

How the Scam Works Step-By-Step

While scam specifics can vary, “Your Google Account Has Been Locked!” generally progresses in the following steps:

Step 1: Victim Lands on Scam Website

The scam begins by a victim landing on a compromised website hosting the malicious pop-up. Scammers gain access to legitimate sites in various ways, including:

  • Exploiting site vulnerabilities – Sites with security weaknesses can have their source code modified to show pop-ups.
  • Hacking site admin accounts – Access to site dashboards allows directly inserting pop-up code.
  • Purchasing ad space – Pop-ups can be served via ad networks with poor vetting controls.

Often, sites impacted are small operations without the security resources of major entities. Still, users should be vigilant across all sites they visit.

Step 2: Scam Pop-up Triggers Panic

Once on an infected site, victims will be served the fake pop-up claiming their Google account has been locked. The bold claims and urgent threats aim to startle users into immediate action.

Psychology principles at work include:

  • Reciprocity – The pop-up provides an apparent alert to problems on your device. Victims feel obligated to help the “support” that aided them.
  • Fear – Threats of account access, stolen data, and device blocking instill anxiety that spurs compliance.
  • Trust – Google’s brand and trademarks are used to convey authority and legitimacy.

Combined, these factors make the average person more inclined to call the scam number.

Step 3: Fake “Support” Answers The Phone

When victims call the number, scammers pose as Google support technicians or account specialists. They confirm victims’ fears and reiterate the supposed urgent threats.

Some scammers utilize VOIP numbers that spoof official business listings. The call environments mimic professional support centers, with hold music and transfer sounds audible.

Scammers build trust through appearing knowledgeable, citing real Google services and terminologies. Victims let their guard down after seemingly reaching genuine support.

Step 4: “Support” Instructs to Download Software

Once earning victim trust, scammers direct them to a resolution. This involves remotely connecting to devices to supposedly “diagnose” the security threats and “unlock” Google accounts.

To enable this access, scammers instruct victims to download legitimate remote access software like TeamViewer, AnyDesk, UltraViewer, etc. Users are persuaded this is necessary for support agents to rectify the supposed issues.

In reality, once installed, scammers can control connected devices without the owner present.

Step 5: Scammer Abuses Remote Access

With remote control granted, scammers are free to access data, install malware, enroll devices in botnets, and resell access.

They often pretend to run “diagnostics” and “remove malware”, showing victims innocuous system processes and files to claim fixing the stated issues. This maintains the guise of legitimacy throughout the scam.

Any credentials entered, sites visited, or files accessed during the session will be visible to scammers. Keylogging malware may also be silently deployed to harvest future data as well.

Step 6: Scam Escalates to Extortion

At this point, scams can escalate in two directions:

1. Demanding payment for unnecessary “services”

Scammers pressure victims to purchase fake support plans, anti-virus software, device cleanings, etc. to “prevent future attacks”. These completely fabricated services can cost hundreds to thousands of dollars.

Victims are scared into covering these bogus fees, often through difficult-to-trace methods like gift cards.

2. Ransomware encryption and extortion

Scammers can secretly install ransomware to encrypt system files, only agreeing to decrypt after substantial Bitcoin ransom payments.

Failure to pay results in permanent data loss. Scammers may also threaten public data exposure if victims refuse payment.

Either path results in victims paying significant sums to protect their data and devices – which were never actually at risk in the first place.

What To Do If You’ve Fallen Victim

If you suspect you have fallen prey to the “Your Google Account Has Been Locked!” or similar tech support scam, remain calm and immediately take the following steps:

Step 1: Disconnect Your Device from The Internet

If scammers still have remote access to your computer, they can continue to steal data or deploy threats.

Unplug your modem or disable WiFi to sever the connection. This limits their capabilities while you address the incident.

Step 2: Reset All Account Passwords

Assume your Google account, email, and any other accessed credentials are compromised.

Visit the official sites and reset all related passwords. Avoid password reuse across accounts for better security.

Enable two-factor authentication (2FA) where possible for additional account protection.

Step 3: Contact Banks/Payment Providers

If banking or payment details were accessed, notify those providers immediately regarding potential fraud.

Consider proactively freezing accounts, canceling current cards, or contesting recent payments to protect assets. Monitor statements closely in the future as well.

Step 4: Scan System For Malware

Download legitimate anti-virus software like Malwarebytes. Perform thorough system scans to uncover and remove any malware installed during remote access sessions.

Keyloggers and information stealing trojans are commonly deployed in tech support scams. Delete anything suspicious detected by scans.

Step 5: Inform Relevant Institutions

Notify any institutions or services related to compromised accounts or data. They can take additional precautions and monitor for fraudulent abuse.

This includes banks, employers, government offices, schools, or anywhere with account credentials accessed through the scam.

Step 6: Block Scammer’s Numbers

Lookup the scam phone numbers that appeared in any urgent pop-ups or were called. Block the numbers through your phone provider and on specific devices.

This prevents repeated targeting by the same scam group in the future. They often re-attack previous victims.

Step 7: File Complaints To Authorities

Report the scam to bodies like the FBI Internet Crime Complaint Center or your local authorities. Provide all available details on the scam webpage, pop-up messages, phone numbers, and any losses incurred.

Your reports contribute to authorities being able to eventually shut down such scams and prosecute cyber criminals involved.

Step 8: Learn From The Experience

Use this incident as a lesson for improving security practices in the future. Avoid navigating to suspicious or shady websites that are more likely to host scams.

Be skeptical of any urgent alerts or support contact – independently verify through official channels before sharing device access or sensitive data.

Stay vigilant and spread awareness to help others avoid this devastating, financially draining scam.

Removal Instructions for “Your Google Account Has Been Locked!” Pop-up Ads

This malware removal guide may appear overwhelming due to the number of steps and numerous programs that are being used. We have only written it this way to provide clear, detailed, and easy-to-understand instructions that anyone can use to remove malware for free.
Please perform all the steps in the correct order. If you have any questions or doubts at any point, stop and ask for our assistance.
Browser hijackers and adware can infect Windows, Mac, or Android devices, so we’ve covered below all these operating systems. Depending on which operating system is installed on the device you’re seeing the “Your Google Account Has Been Locked!” pop-up ads, please click on the operating system icon below and follow the displayed steps to remove it.
Removal Instructions for Windows

Remove “Your Google Account Has Been Locked!” from Windows

To remove the “Your Google Account Has Been Locked!” pop-ups from your computer, follow these steps:

STEP 1: Reset browsers back to default settings

In this first step, we will reset your browser settings back to their default settings to remove spam push notifications, malicious extensions, and unwanted search engines.
Please note that this method will remove all extensions, toolbars, and other customizations but will leave your bookmarks and favorites intact. For each browser that you have installed on your computer, please click on the browsers tab below and follow the displayed steps to reset that browser.

ChromeFirefoxMicrosoft EdgeInternet Explorer
Reset Chrome for Windows to default settings

We will now reset your Chrome browser settings to their original defaults. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.

  1. Click the three dots in the top-right corner and then click on “Settings”.

    Open Chrome and click on the menu button (represented by three vertical dots) in the top right corner of the window. In the dropdown menu that opens, click “Settings“. Click on the Chrome menu button then on the Settings button
  2. Click “Advanced”.

    Chrome’s “Settings” should now be displayed in a new tab or window, depending on your configuration. In the left sidebar, click on the “Advanced” link. Click on the Advanced link
  3. Click “Reset and clean up”.

    In the left sidebar, under the “Advanced” section, click on “Reset and clean up“. Click Reset and clean up button
  4. Click “Reset settings to their original defaults”.

    In the main window, the “Reset and clean up” section is visible, as shown in the screenshot below. Click on “Reset settings to their original defaults“. Click on Reset settings to their original defaults
  5. Click “Reset settings”.

    A confirmation dialog will now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset settings” button. Click on Reset Settings to restore Google Chrome to its default settings
  6. (Optional) Reset Chrome Data Sync.

    In case a malicious extension reinstalls itself even after performing a browser reset, you have an additional option to reset the data sync for your browser. To do this, navigate to chrome.google.com/sync and click on the Clear Data button. Chrome Sync Reset
Reset Firefox for Windows to default settings

We will now reset your Firefox browser settings to their default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.

  1. Click the three horizontal lines in the top-right corner and then click on “Help”.

    Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
    Click on the Firefox Menu button then select Help button

  2. Click “More troubleshooting information”.

    From the Help menu, click on “More troubleshooting information“.
    Click More Troubleshooting Information

  3. Click on “Refresh Firefox”

    When the “Troubleshooting Information” page opens, click on the “Refresh Firefox” button.
    Click on Refresh Firefox

  4. Confirm that you want to reset your browser settings.

    To finish the reset process, click on the “Refresh Firefox” button in the new confirmation window that opens.
    Click again on Refresh Firefox button

  5. Click “Finish”.

    Firefox will now close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on “Finish“.

    Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.

Reset Microsoft Edge to default settings

We will now reset your Microsoft Edge browser settings to their default. This will reset your startup page, new tab page, search engine, and pinned tabs. It will also disable all extensions and clear temporary data like cookies. Your favorites, history, and saved passwords will not be cleared.

  1. Click the three dots in the top-right corner and then click on “Settings”.

    In the top right corner, click on Microsoft Edge’s main menu button, represented by three horizontal dots. When the drop-down menu appears, click on “Settings“.
    Click the three dots in the top-right corner and then click on Settings

  2. Click on “Reset Settings”.

    On the left side of the window, click on “Reset Settings“.
    Click Reset Settings option

  3. Click on “Restore settings to their default values”.

    In the main window, click on “Restore settings to their default values“.
    Select Restore settings to their default values

  4. Click “Reset”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset” button.
    Click Reset to reset your browser
    Microsoft Edge will now erase all your personal data, browsing history, and disable all installed extensions. Your bookmarks, though, will remain intact and still be accessible.

Reset Internet Explorer to default settings

We will now reset your Internet Explorer browser settings to their default. You can reset Internet Explorer settings to return them to the state they were in when Internet Explorer was first installed on your computer.

  1. Go to “Internet Options”.

    Open Internet Explorer, click on the gear icon in the upper-right part of your browser, then select “Internet Options“.

  2. Select the “Advanced” tab, then click “Reset”

    In the “Internet Options” dialog box, select the “Advanced” tab, then click on the “Reset” button.

  3. Click on “Reset”.

    In the “Reset Internet Explorer settings” section, select the “Delete personal settings” checkbox, then click on the “Reset” button.

  4. Click on “Close”.

    When Internet Explorer has completed its task, click on the “Close” button in the confirmation dialogue box.
    Close your browser and then you can open Internet Explorer again.

Now that we’ve removed the sites permissions to send push notifications, in the next step we will scan your computer for any infections, adware, or potentially unwanted programs that may be present on your device.


STEP 2: Use Malwarebytes Anti-Malware to remove malware and unwanted programs

In this second step, we will install Malwarebytes to scan and remove any infections, adware, or potentially unwanted programs that may be present on your computer.

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

STEP 3: Use HitmanPro to scan your computer for badware

In this third step, we will scan the computer with HitmanPro to ensure that no other malicious programs are installed on your device.

HitmanPro is a second-opinion scanner that takes a unique cloud-based approach to malware scanning. HitmanPro scans the behavior of active files and also files in locations where malware normally resides for suspicious activity. If it finds a suspicious file that’s not already known, HitmanPro sends it to its clouds to be scanned by two of the best antivirus engines today, which are Bitdefender and Kaspersky.

Although HitmanPro is shareware and costs $24.95 for 1 year on 1 PC, there is no limit on scanning. The limitation only kicks in when there is a need to remove or quarantine detected malware by HitmanPro on your system and by then, you can activate the one-time 30-days trial to enable the cleanup.

  1. Download HitmanPro.

    You can download HitmanPro by clicking the link below.

    HITMANPRO DOWNLOAD LINK
    (The above link will open a new web page from where you can download HitmanPro)
  2. Install HitmanPro.

    When HitmanPro has finished downloading, double-click on “hitmanpro.exe” (for 32-bit versions of Windows) or “hitmanpro_x64.exe” (for 64-bit versions of Windows) to install this program on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on the HitmanPro file

    You may be presented with a User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.

    Windows asking for permissions to run the HitmanPro setup

  3. Follow the on-screen prompts.

    When HitmanPro starts you will be presented with the start screen as shown below. Click on the “Next” button to perform a system scan.

    Click Next to install HitmanPro on your PC

    HitmanPro final installer screen

  4. Wait for the HitmanPro scan to complete.

    HitmanPro will now begin to scan your computer for malicious programs.
    HitmanPro scans your computer for any infections, adware, or potentially unwanted programs that may be present

  5. Click on “Next”.

    When HitmanPro has finished the scan, it will display a list of all the malware that it has found. Click on the “Next” button to have HitmanPro remove the detected items.

    HitmanPro scan summary. Click Next to remove malware

  6. Click on “Activate free license”.

    HitmanPro may now require to activate the free 30-days trial to remove the malicious files. To do this, click on the “Activate free license” button to begin the free 30 days trial and remove all the malicious files from your computer.
    Click on the Activate free license button

    When the malware removal process is complete, it will display a screen that shows the status of the various programs that were removed. At this screen, you should click on the Next button and then if prompted you should click on the Reboot button. If HitmanPro does not prompt you to reboot, please just click on the Close button.

Your computer should now be free of the “Your Google Account Has Been Locked!” pop-up ads and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Removal Instructions for Mac

Remove “Your Google Account Has Been Locked!” from Mac

To remove the “Your Google Account Has Been Locked!” pop-ups from your Mac, follow these steps:

STEP 1: Reset browsers back to default settings

In this first step, we will restore your browser settings back to their default configuration to remove spam
push notifications, malicious extensions, and unwanted browser settings.
Please note that this method will remove all extensions, toolbars, and other customizations but will leave your bookmarks and favorites intact. For each browser that you have installed on your computer, please click on the browsers tab below and follow the displayed steps to reset that browser.

Safari BrowserChrome for Mac BrowserFirefox for Mac Browser
Remove Malware and Spam Push Notifications from Safari

To remove spam push notifications from Safari we will check if there are any malicious extensions installed on your browser and restore your browser settings to default.

  1. Go to Safari’s “Preferences”.

    On the menu bar, click the “Safari” menu and select “Preferences”.
    On the Menu bar Click on Safari then Preference

  2. Check Homepage.

    This will open a new window with your Safari preferences, opened to the “General” tab. Some browser hijackers may change your default homepage, so in the Homepage field make sure it’s a web page you want to use as your start-up page.

    Change Homepage in Safari

  3. Click “Extensions”

    Next, click on the “Extensions” tab.
    Click on Extensions MacOS

  4. Find and uninstall malicious extensions.

    The “Extensions” screen will be displayed with a list of all the extensions installed on Safari. Look out for any suspicious browser extension that could be behind all the drama – anything you don’t remember downloading or that doesn’t sound like a genuine extension. By default, there are no extensions installed on Safari so it’s safe to remove an extension
    Click on Uninstall to remove malicious extension

  5. Remove spam notifications ads

    Click Preferences, click Websites, then click Notifications. Deselect “Allow websites to ask for permission to send push notifications”.

    Deselect Allow websites to ask for permission to send push notifications

  6. Remove all data stored by websites on your computer.

    In the Safari menu, choose “Preferences…”, select “Privacy” at the top of the new window that appears, and then click the “Manage Website Data” button.
    Click Manage Website Data

    In the next dialog box, click “Remove All“. It will ask you if you are sure you want to remove all data stored by websites on your computer. Select “Remove Now” to clear data that could be used to track your browsing.

    Click Remove All Website Data

  7. Empty Safari Caches.

    From your Safari menu bar, click Safari and select Preferences, then select the Advanced tab. Enable the checkbox to “Show Develop menu in menu bar“.
    Show Dev Bar

    From the menu bar select Develop, then click on Empty Caches as seen in the image below.
    empty cache

Remove Malware and Spam Push Notifications from Chrome for Mac

To remove spam push notifications from Chrome for Mac we will reset the browser settings to its default. Doing these steps will erase all configuration information from Chrome such as your home page, tab settings, saved form information, browsing history, and cookies. This process will also disable any installed extensions. All of your bookmarks, though, will be preserved.

  1. Click on the three dots at the top right and go to Settings.

    Click on Chrome’s main menu button, represented by three dots at the top right corner. Now click on the menu option labeled Settings as shown by the arrow in the picture below, which will open the basic settings screen. Click on the Chrome menu button then on the Settings button
  2. In the left sidebar, click on the “Reset and Cleanup” option.

    In the left sidebar, click on “Reset and clean up“. Click on Reset and Cleanup
  3. Click “Reset settings to their original defaults”.

    Now click on the “Reset settings to their original defaults”. link as shown in the image below.  Reset Chrome
  4. Click “Reset Settings” button.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, click on the “Reset Settings” button. Confirm Reset Chrome browser
  5. (Optional) Reset Chrome Data Sync.

    In case a malicious extension reinstalls itself even after performing a browser reset, you have an additional option to reset the data sync for your browser. To do this, navigate to chrome.google.com/sync and click on the Clear Data button. Chrome Sync Reset
Remove Malware and Spam Push Notifications from Firefox for Mac

To remove spam push notifications from Firefox for Mac we will reset the browser settings to its default. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.

  1. Go to the “Help” menu.

    Click on Firefox’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled “Help“.
    Image - Click on the Firefox Menu button then select Help

  2. Click “Troubleshooting Information”.

    Next click on the “Troubleshooting Information” option as indicated by the arrow in the image below. This will bring you to a Troubleshooting page.

    Image - Troubleshooting Information option in Firefox Mac

  3. Click on “Refresh Firefox”

    Click the “Refresh Firefox” button in the upper-right corner of the “Troubleshooting Information” page.
    Image - Click on the Refresh Firefox button Mac

  4. Confirm.

    To continue, click on the “Refresh Firefox” button in the new confirmation window that opens.
    Image - Click again on Refresh Firefox button

  5. Click on “Finish”.

    Firefox will close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on the “Finish“.

Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.
Now that we’ve removed the spam push notifications and malicious extensions from your browser, in the next step we will scan your Mac for any malware infections that may be present on your device.


STEP 2: Use Malwarebytes for Mac to remove Malware and Unwanted Programs

In this second step, we will download, install and run a scan with Malwarebytes to find and remove browser hijackers, adware, malicious browser extensions, and other malware from your Mac.

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your computer should now be free of the “Your Google Account Has Been Locked!” pop-up ads and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Removal Instructions for Android

Remove “Your Google Account Has Been Locked!” from Android

To remove the “Your Google Account Has Been Locked!” pop-ups from your phone or tablet, follow these steps:

STEP 1: Reset browsers back to default settings

In this first step, we will remove the permissions to send push notifications to your phone’s browser. Depending on which browser are you seeing the spam push notifications, click on the below browser tab.

ChromeFirefoxOperaBraveSamsung Internet BrowserMicrosoft Edge
Remove spam notifications from Chrome for Android
  1. On your Android phone, open Google Chrome
  2. In the top right corner, tap the More button (three vertical dots).
    Click the Chrome Menu button
  3. When the pop-up menu opens, tap on Settings.

    Tap on Settings - Chrome for Android

  4. Chrome’s “Settings” menu should now be displayed, tap on Notifications.

    Tap on Notifications

  5.  When Chrome’s “App notifications” menu will open, toggle off the Show notifications option.

    Turn of Notifications in Chrome for Android

Remove spam notifications from Firefox for Android

To remove the Captchasee.live advertisements from Firefox we will reset the browser settings to their default. This will remove all the cookies, cache, and other site settings that may have been saved.

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Firefox.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Firefox app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When Firefox’s app info menu is displayed, tap on “Storage“.
    Firefox - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Firefox - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Firefox data including accounts, bookmarks, and your settings to reset the default settings.
    Firefox - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

Remove spam notifications from Opera

To remove the Captchasee.live advertisements from the Opera browser we will reset the browser settings to their default. This will remove all the cookies, cache, and other site settings that may have been saved.

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Opera.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Opera app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When Opera’s app info menu is displayed, tap on “Storage“.
    Opera - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Opera - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Opera’s data including accounts, bookmarks, and your settings to reset the default settings.
    Opera - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

Remove spam notifications from Brave

To remove the Captchasee.live advertisements from Brave browser we will reset the browser settings to their default. This will remove all the cookies, cache, and other site settings that may have been saved.

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Brave.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Brave app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When the Brave’s app info menu is displayed, tap on “Storage“.
    Brave - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Brave - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Brave’s data including accounts, bookmarks, and your settings to reset the default settings.
    Brave - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

Remove spam notifications from Samsung Internet Browser

To remove the Captchasee.live advertisements from Samsung Internet Browser we will reset the browser settings to their default. This will remove all the cookies, cache, and other site settings that may have been saved.

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Samsung Internet Browser.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Samsung Internet Browser app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When the Samsung Internet Browser’s app info menu is displayed, tap on “Storage“.
    Samsung Internet Browser - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Samsung Internet Browser - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Samsung Internet Browser’s data including accounts, bookmarks, and your settings to reset the default settings.
    Samsung Internet Browser - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

Remove spam notifications from Microsoft Edge

To remove the Captchasee.live advertisements from Microsoft Edge we will reset the browser settings to their default. This will remove all the cookies, cache, and other site settings that may have been saved.

  1. Open the “Settings” menu.

    Tap on the “Settings” app from your phone menu or home screen.
    Settings app in Android

  2. Tap on “Apps”.

    When the “Settings” menu opens, tap on “Apps” (or “App Manager”) to see all the installed applications on your phone.
    Tap on Apps

  3. Find and tap on Microsoft Edge.

    The “Apps” screen will be displayed with a list of all the apps installed on your phone. Scroll through the list until you find the Microsoft Edge app, then tap on it to open the app’s details.
    Search trough the Apps list for the malicious app

  4. Tap “Storage”.

    When the Microsoft Edge’s app info menu is displayed, tap on “Storage“.
    Microsoft Edge - Tap on Storage

  5. Tap “Manage Space”.

    Under the storage settings, you will get two options — Manage Space and Clear Cache. Tap on “Manage Space“.
    Microsoft Edge - Tap on Manage Storage

  6. Tap “Clear all data”.

    Tap “Clear all data” to delete all Microsoft Edge’s data including accounts, bookmarks, and your settings to reset the default settings.
    Microsoft Edge - Tap on Clear All Data

  7. Confirm by tapping “Ok”.

    A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue with the reset process. To complete the restoration process, tap “Ok“.

STEP 2:Use Malwarebytes for Android to remove Malware and Malicious Apps

In this second step, we will install Malwarebytes to scan and remove adware, malicious apps, and other malware from your phone.

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.

Your phone should now be free of the “Your Google Account Has Been Locked!” pop-up ads and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

How To Avoid Falling Victim

While no internet user is completely immune to sophisticated scams, several best practices can greatly reduce your risks online:

Install Ad and Pop-up Blockers

Many reputable ad block browser extensions like uBlock Origin help stop malicious content from even loading on sites. This prevents deceptive pop-up scams from appearing in the first place.

Configure browsers to block pop-ups by default for further protection against unwanted content.

Keep Software Updated

Always maintain the latest security updates for operating systems, browsers, plugins, and other software. Updates patch vulnerabilities that scammers can otherwise exploit to inject pop-ups.

Enable auto-updates where possible so you don’t have to manually apply every fix.

Use Antivirus Tools

Well-rated antivirus software provides real-time scanning of sites you access to detect and block known scams or malicious code. This ensures you don’t land on domains spreading “Your Google Account Has Been Locked!”.

Run regular system scans as well to check for any malware that made it onto your devices.

Avoid Suspicious Downloads and Links

Exercise caution around sites prompting you to download software or browser extensions. Likewise, avoid clicking links in unexpected emails directing to unknown pages.

These often lead to malware or directly open scam pop-up windows. Stick to trusted, verified sources.

Secure Accounts with 2FA

For key accounts like Google, Facebook, and email, enable two-factor authentication (2FA). This adds a secondary login step beyond just a password.

2FA prevents scammers from accessing accounts in the event they phish credentials. The extra login factor blocks unauthorized access.

Never Share Access Remotely

Refuse any calls claiming to be tech support requesting remote access to your device. Real support never needs such access without your explicit prior consent.

Never download software for strangers to view or control your system. Avoid becoming a victim from the start.

Conclusion

Being online comes with inherent risks – but armed with the right knowledge, users can avoid perils like “Your Google Account Has Been Locked!”. Recognize telltale signs of scams, don’t fall for manipulative messages, safeguard your system and accounts, and report any attacks.

Spreading awareness among family and friends can also help protect wider communities against fraud. Together we can all reclaim security and peace of mind across the digital world.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.