'Abnormal Network Traffic on This Device' Pop-Up Scam
Cybersecurity experts have uncovered a malicious setup that is propagating the 'Abnormal Network Traffic on This Device' scam. It's worth noting that the installer promoted by untrustworthy and malicious websites was also used by scammers to promote various questionable PUPs (Potentially Unwanted Programs). One example of such an intrusive application is the CovidDash browser extension, which has browser hijacker capabilities.
The 'Abnormal Network Traffic on This Device' Scam Relies on Fake Security Alerts
The pop-up window displayed by the unsafe file poses as a warning from Microsoft, stating that suspicious network traffic has been detected on the user's device. As a result, the computer has been disconnected from the network for safety reasons. The pop-up then instructs users to scan the presented QR code provided below the message for supposedly identity verification and network restoration purposes.
However, the QR code leads users to a rogue website, which displays the same warning from the pop-up and instructs visitors to click the 'Continue' button. Once the button is pressed, another misleading page posing as Microsoft is opened. This time users are urged to input personally identifiable and credit card information, including credit card number, expiration date, CVV, the cardholder's name, addresses, and phone number.
By providing such sensitive details to the phishing website, users would inadvertently make their private data to scammers, who could use it to steal their identities, make fraudulent transactions and online purchases. Therefore, users who have already provided their private data to this scam should immediately take action and contact the appropriate authorities.
Finally, it is absolutely crucial to note that the claims displayed as part of the 'Abnormal Network Traffic on This DeviceV scam are completely and entirely fake and that the Microsoft Corporation is in no way connected to it.
Pay Attention to the Typical Red Flags of a Phishing Scheme
Phishing schemes often rely on psychological tactics to trick victims into releasing sensitive information or performing actions that are detrimental to their interests. Some usual red flags to look out for in such scams include the use of urgency, fear, or promises of lucrative rewards, as well as the use of fake or misleading information.
The fraudsters also may try to imitate legitimate sources, such as emails from banks, social media accounts, or government agencies, to increase their chances of success. Another common tactic is to create a sense of legitimacy by using logos, graphics, or other visual cues that mimic official branding. Overall, the key to avoiding phishing scams is to stay vigilant and skeptical and to always verify the authenticity of requests or offers before responding.