{"id":772,"date":"2024-06-12T09:57:04","date_gmt":"2024-06-12T09:57:04","guid":{"rendered":"https:\/\/blog.gridinsoft.com\/?p=772"},"modified":"2025-07-09T01:20:20","modified_gmt":"2025-07-09T01:20:20","slug":"your-computer-is-infected-scam","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/your-computer-is-infected-scam\/","title":{"rendered":"Your Computer is Infected"},"content":{"rendered":"<p><strong>Your computer is infected is a campaign of scam pop-up notifications<\/strong>, that aims at tricking users into downloading unwanted programs. Key purpose of the popups is to intimidate people, making them think their system is infected. Let\u2019s debunk this scam by going through each of its steps, and see how to avoid it in future.<\/p>\n<h2>What Is \u201cYour computer is infected\u201d Notification?<\/h2>\n<p>The &#8220;Your computer is infected&#8221; pop-up notification is a scam that aims at <strong>intimidating the user<\/strong> and forcing them into further fraudulent actions. These notifications usually appear as pop-up windows or alerts that can look like legitimate system messages, antivirus alerts, or browser notifications. In fact they are totally fake, designed to scare or trick users into taking a particular action, often by making them believe their computer is infected with a virus or other malware.<\/p>\n<figure id=\"attachment_22749\" aria-describedby=\"caption-attachment-22749\" style=\"width: 591px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/Your-PC-is-infected.webp\" alt=\"Your computer is infected notification screenshot\" width=\"591\" height=\"505\" class=\"size-full wp-image-22749\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/Your-PC-is-infected.webp 591w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/Your-PC-is-infected-300x256.webp 300w\" sizes=\"auto, (max-width: 591px) 100vw, 591px\" \/><figcaption id=\"caption-attachment-22749\" class=\"wp-caption-text\">Your computer is infected notification<\/figcaption><\/figure>\n<p>This usually results from visiting websites with <a href=\"http:\/\/gridinsoft.com\/crack\">pirated content<\/a>, such as movies or games, as well as adult content sites. These websites often embed malicious code, so any interaction with the site, whether it&#8217;s clicking a link or pressing the play button, can lead to redirects and, eventually, pop-up notifications or a flood of ad banners.<\/p>\n<h2>How Does This Scam Work?<\/h2>\n<p>Let\u2019s go through the entire course of action to understand the source of fake notifications. As I mentioned earlier, in most cases, the first step is about the user <strong>visiting dubious websites<\/strong>. The issue lies in the fact that the owner of a pirated site usually adds hidden redirect links to everything on the site: buttons, images, links, etc. With such traps, any click on these elements automatically triggers a redirection, and the user finds themselves on another site, the one that offers to allow pop-up notifications.<\/p>\n<p>From the user\u2019s perspective, this looks like <a href=\"https:\/\/gridinsoft.com\/ddos\">anti-DDoS<\/a> or anti-bot protection. They allow pop-ups, willing to keep watching. But that is what allows for the rest of this scam.<\/p>\n<h3>Flood Of Notifications &#038; Fake Scan<\/h3>\n<p>Typically, right after clicking &#8220;Allow,&#8221; nothing seems to happen, so the user doesn&#8217;t pay much attention to it. However, after a while, the websites start sending <strong>a huge number of notifications<\/strong>. Although these notifications come from the web browser, they look like system alerts and can contain various messages.<\/p>\n<p>This is where &#8220;Your computer is infected&#8221; pop-ups hove into view. Appearing in dozens, they confuse people due to excessive usage of capital letters and alarming wording. When the user clicks on this notification, it throws them to a fraudulent website. The site then performs a fake scan, finds numerous issues, and suggests installing a \u201cfix tool&#8221; to resolve these problems.<\/p>\n<p>Obviously, all these &#8220;issues&#8221; and detected malware are fake because <strong>no website can scan a device for viruses<\/strong> \u2013 it is just technically impossible. These actions aim to trick the user into installing unwanted software, particularly <a href=\"https:\/\/gridinsoft.com\/blogs\/what-is-scareware\/\">rogue antiviruses<\/a> or pseudo-effective apps.<\/p>\n<h3>Fake Support Page<\/h3>\n<p>An alternative scenario involves redirecting the user to <a href=\"https:\/\/gridinsoft.com\/blogs\/windows-defender-security-warning\/\">a fake tech support page<\/a>. In this case, the user lands on a webpage that mimics an official Microsoft support site. Typically, this page displays banners or notifications claiming issues with the computer and urges the user to call a specified number for assistance.<\/p>\n<figure id=\"attachment_22751\" aria-describedby=\"caption-attachment-22751\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/tech-support-scam.webp\" alt=\"Fake tech support scam screenshot\" width=\"1920\" height=\"1080\" class=\"size-full wp-image-22751\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/tech-support-scam.webp 1920w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/tech-support-scam-300x169.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/tech-support-scam-1024x576.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/tech-support-scam-768x432.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/tech-support-scam-1536x864.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/tech-support-scam-1568x882.webp 1568w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><figcaption id=\"caption-attachment-22751\" class=\"wp-caption-text\">Fake tech support scam<\/figcaption><\/figure>\n<p>If the user calls the provided number, they reach scammers posing as legitimate support staff. These fraudsters may attempt to obtain personal information or credit card details, trick the user into paying for &#8220;fixing&#8221; nonexistent issues, or gain remote access to their computer through a remote connection. The latter is particularly dangerous as it grants the scammers full control over the device.<\/p>\n<h2>Is Your Computer Infected?<\/h2>\n<p>It is possible to manually remove the pop-up source through the browser interface. To do this, go to your browser settings, find notification settings, and remove all the sites listed as ones that can send notifications. Reload the browser to apply the changes.<\/p>\n<div class=\"su-image-carousel  su-image-carousel-has-spacing su-image-carousel-has-outline su-image-carousel-adaptive su-image-carousel-slides-style-default su-image-carousel-controls-style-dark su-image-carousel-align-center\" style=\"\" data-flickity-options='{\"groupCells\":true,\"cellSelector\":\".su-image-carousel-item\",\"adaptiveHeight\":true,\"cellAlign\":\"left\",\"prevNextButtons\":true,\"pageDots\":true,\"autoPlay\":5000,\"imagesLoaded\":true,\"contain\":false,\"selectedAttraction\":0.007,\"friction\":0.25}' id=\"su_image_carousel_696d0b07506a4\"><div class=\"su-image-carousel-item\"><div class=\"su-image-carousel-item-content\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"1360\" height=\"863\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/disable-notifs-p1.webp\" class=\"\" alt=\"Disable pop-ups in browser st1\" title=\"\"><span>Disabling browser pop-ups (scroll images)<\/span><\/div><\/div><div class=\"su-image-carousel-item\"><div class=\"su-image-carousel-item-content\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"846\" height=\"571\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/disable-chrome-notifs2.webp\" class=\"\" alt=\"Disable pop-ups in browser st2\" title=\"\"><span><\/span><\/div><\/div><\/div><script id=\"su_image_carousel_696d0b07506a4_script\">if(window.SUImageCarousel){setTimeout(function() {window.SUImageCarousel.initGallery(document.getElementById(\"su_image_carousel_696d0b07506a4\"))}, 0);}var su_image_carousel_696d0b07506a4_script=document.getElementById(\"su_image_carousel_696d0b07506a4_script\");if(su_image_carousel_696d0b07506a4_script){su_image_carousel_696d0b07506a4_script.parentNode.removeChild(su_image_carousel_696d0b07506a4_script);}<\/script>\nZ<\/p>\n<p>Afterward, I still recommend performing a system scan for malware using legitimate antivirus software.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp\" alt=\"GridinSoft Anti-Malware main screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22665\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.<\/p>\n<div style=\"text-align:center\"><a href=\"\/download\/antimalware\" class=\"btn border-black\" rel=\"nofollow\">Download Anti-Malware<\/a><\/div>\n<p>After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click \"Advanced mode\" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp\" alt=\"Scan results screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22666\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Click \"Clean Now\" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp\" alt=\"Removal finished\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22667\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Your computer is infected is a campaign of scam pop-up notifications, that aims at tricking users into downloading unwanted programs. Key purpose of the popups is to intimidate people, making them think their system is infected. Let\u2019s debunk this scam by going through each of its steps, and see how to avoid it in future. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":22781,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[1549],"tags":[348,915,826],"class_list":{"0":"post-772","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-troubleshooting","8":"tag-online-fraud","9":"tag-pop-ups","10":"tag-scam"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/Your-Computer-is-Infected.webp","author_info":{"display_name":"Polina Lisovskaya","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/polina\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=772"}],"version-history":[{"count":12,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/772\/revisions"}],"predecessor-version":[{"id":22756,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/772\/revisions\/22756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/22781"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}