๐จ Immediate Action Checklist: D.C.C.R.
๐ญ Scams & Fake Pop-Ups
If a Fake Pop-Up Is Still On Screen
Take these immediate actions to safely close the scam without triggering any malicious behavior:
- Don't click anything on the pop-up โ Don't click OK, Cancel, Allow, or even the X button. Many fake alerts trigger downloads or redirects when clicked.
- Force-close your browser โ Press Ctrl + Shift + Esc to open Task Manager, select your browser from the list, and click End Task.
- If the browser won't close โ Hold the power button on your computer to force shutdown. Wait about 10 seconds, then restart.
โ Good News
Many pop-ups are just malicious advertisements โ your computer may not actually have any malware or infections. Advertisers have been targeted heavily lately, resulting in these scary but often harmless fake alerts.
At minimum: If you can turn the computer off, nothing further can happen while it's powered down.
After Restarting: Clean-Up Steps
Once your computer is back on, follow these steps to ensure the scam page doesn't return:
- Clear browser data โ Clear your cache, cookies, and site data. This removes scripts that try to reload the scam page. (Recommended tools: BleachBit for Windows or OnyX for Mac)
- Check browser notification permissions โ Go to browser Settings โ Privacy & Security โ Site Settings โ Notifications. Remove anything you don't recognize from the Allow list.
- Run a full antivirus scan โ Use trusted security software like MalwareBytes and Windows Security/Defender. Run full scans, not quick scans.
- Check installed programs โ Look for recently installed or unfamiliar software. Uninstall anything suspicious or that you don't remember installing.
- Disable unnecessary browser notifications โ If website notifications aren't needed, turn them off entirely. This prevents future "You have a virus!" scare tactics.
Tech Support Scam Warning
โ ๏ธ Legitimate Companies Will NEVER:
- Display pop-ups with phone numbers to call
- Cold-call you claiming your computer has problems
- Ask for remote access to your computer
- Request payment via gift cards or wire transfer
- Create urgency or use scare tactics
Microsoft, Apple, Google, and antivirus companies do NOT use pop-ups with phone numbers.
If you gave remote access to a scammer:
- Disconnect from internet immediately โ Unplug ethernet or turn off Wi-Fi
- Uninstall remote access software โ Go to Control Panel โ Programs and uninstall TeamViewer, AnyDesk, LogMeIn, QuickSupport, etc.
- Run security scans โ Use Malwarebytes, ADW Cleaner, and Microsoft Malicious Software Removal Tool (MRT)
- Change all passwords โ Especially email and financial accounts
๐ณ Fraud & Identity Theft
If You've Experienced Financial Fraud
Take these steps immediately if you've lost money or given financial information to scammers:
- Contact your bank/credit card company IMMEDIATELY โ Report fraudulent charges and request to freeze or close compromised accounts. Time is critical for recovering funds.
- Document everything โ Save screenshots, emails, phone numbers, transaction records, and any communication with the scammer.
- File a police report โ Required for disputing fraudulent charges and pursuing recovery. Get a copy of the report number.
- Place a fraud alert on your credit โ Contact one of the three credit bureaus (Equifax, Experian, TransUnion) โ they'll notify the others.
- Consider a credit freeze โ Prevents new accounts from being opened in your name.
๐ซ Payment Methods & Recovery Chances
- Credit Card: Best chance of recovery โ dispute through your card issuer
- Debit Card: Contact bank immediately โ recovery is possible but harder
- Wire Transfer: Very difficult to recover โ contact bank within 24 hours
- Gift Cards: Almost impossible to recover โ contact the gift card company anyway
- Cryptocurrency: Extremely unlikely to recover โ still report to IC3
Identity Theft Response
If your personal information (SSN, driver's license, etc.) has been stolen:
- Report to IdentityTheft.gov โ Create a recovery plan and get pre-filled letters to send to companies
- Place a fraud alert or credit freeze โ Contact all three credit bureaus
- Review your credit reports โ Look for accounts you didn't open at AnnualCreditReport.com
- Close fraudulent accounts โ Contact companies where fraudulent accounts were opened
- Report to the FTC and file a police report โ Creates official documentation of the theft
- Consider an IRS Identity Protection PIN โ Prevents tax fraud if SSN was stolen
๐ Hacked & Compromised Accounts
Signs Your Account May Be Compromised
Watch for these warning signs that indicate unauthorized access:
Account Warning Signs
Unable to log in โข Password reset emails you didn't request โข Login notifications from unknown locations โข Emails/messages you didn't send
Financial Indicators
Unauthorized purchases โข Unknown transactions โข New accounts you didn't open โข Missing funds or rewards points
Device Behavior
Unexpected battery drain โข Unusual data usage โข Unknown apps installed โข Slower performance โข Random pop-ups
Social Indicators
Friends report strange messages โข Posts you didn't make โข Profile changes you didn't make โข Locked out of accounts
Securing Compromised Accounts
Follow this priority order to regain control and secure your accounts:
- Secure your email FIRST โ Your email is the gateway to all other accounts. Change password immediately and enable 2FA.
- Secure financial accounts โ Banks, credit cards, PayPal, Venmo, CashApp, Zelle, investment accounts
- Secure shopping accounts โ Amazon, eBay, and any sites storing payment information
- Secure social media โ Facebook, Instagram, Twitter/X, LinkedIn
- Log out of ALL devices โ Force logout on all devices for each account (usually in Security settings)
- Review connected apps โ Revoke access to any suspicious third-party apps
๐ Password & Security Best Practices
- Use strong, unique passwords (12+ characters with letters, numbers, symbols)
- Never reuse passwords across different accounts
- Use a password manager (Bitwarden, 1Password, LastPass)
- Enable Two-Factor Authentication (2FA) on all accounts
- Best 2FA: Security keys (YubiKey) or Authenticator apps (Google Authenticator, Authy)
- Avoid: SMS/text message 2FA when possible (vulnerable to SIM-swapping)
When to Get Professional Help
You should seek professional assistance if:
- Pop-ups keep coming back after following clean-up steps
- The browser reopens scam pages on startup
- Unknown software keeps reinstalling itself
- You granted remote access to a scammer
- You suspect accounts have been compromised
- You've experienced significant financial loss
- You're locked out of multiple accounts
- You're unsure if your device is clean
๐ Report & Get Help
Report the Incident
Reporting helps protect others and may help law enforcement track down criminals. Your report makes a difference!
PNWC Scam/Hack Reporting Form
Report details to Pacific Northwest Computers for investigation and documentation
FTC Report Fraud
Federal Trade Commission โ Report scams, fraud, and bad business practices
FBI Internet Crime Complaint Center (IC3)
Report internet-enabled crimes including fraud, identity theft, and cyber scams
IdentityTheft.gov
FTC's identity theft recovery resource โ create a personalized recovery plan
Identity Theft Resource Center
Free support and resources for identity theft victims
FTC Scam Information
Learn about the latest scams and how to protect yourself
Helpful Guides & Resources
Browse our detailed guides for handling scams, securing accounts, and protecting yourself online:
What To Do If You Are Compromised
Comprehensive guide for responding to scams and account compromises
Email Account Security Audit Guide
Steps to audit and secure your email accounts
Find Out if Someone is in Your Account
How to check if your accounts have been accessed without permission
PC Clean-Up & Tune-Up Guide
In-depth guide for cleaning up and securing your computer
Virus Scan & System Cleanup Tutorial
Step-by-step guide for a full virus clean-up
What To Do If You Are Being Cyber Stalked
How to protect yourself from online harassment and stalking
PNW Computers Blog
More guides, tutorials, and cybersecurity resources
Need Professional Help?
If you need assistance or would like to schedule an emergency appointment: