gesty

Q: adware attack phone 0800 917 4842

Just got semi scammed by these people, who I thought were Apple Support. Unfortunately they got as far as me allowing them remote access to my brand new macb air. But when they tried selling me outrageously expensive firewall protection (presumably to gain access to bank details) I smelled a rat & told them I'd have to go to an Apple store to confirm as I couldn't be sure who they were who they said they were. The guy quickly lost interest & hung up.

 

So the good news is there's nothing on my mba yet except for contacts & photos when I synched with icloud, so I can't see how they could have access to anything other than those things & my mba password, which I had to type in to restart & give him remote access.But I am worried that they may have installed some kind of virus/keystroke logger etc.  Just checked my bank & no suspicious activity. But they did ask if I had another computer & I told them about my Microsoft PC, which was on at the time. Is there any way they could access that over the wifi the mac was using? I had trouble accessing Apple Support on it & I thought they may have control of my phone line somehow & keeping it open, although we only were talking over the mba.

 

Feel stupid & a bit freaked out atm. I have an appointment at a Genius bar next week & I won't use the Mac again till then. Not even to change my Password. Not that i know how to do that anyway. This is my 1st mac & totally unfamiliar with how to drive it.

 

Any suggestions?

iPhone 5, iOS 6.1.4

Posted on Aug 6, 2015 6:31 AM

Close

Q: adware attack phone 0800 917 4842

  • All replies
  • Helpful answers

  • by Carolyn Samit,

    Carolyn Samit Carolyn Samit Aug 6, 2015 6:50 AM in response to gesty
    Level 10 (124,473 points)
    Apple Music
    Aug 6, 2015 6:50 AM in response to gesty

    my mba password, which I had to type in to restart & give him remote access.

     

    It's definitely a scam.


    Do not wait to change your password  >  Change or reset a user account password on your Mac - Apple Support

     

     

    If you are using Safari, from your Safari menu bar click Safari > Preferences  then select the Privacy tab.

     

    Click:  Remove All Website Data


     

    The check for malware.

     

    Download and run Malwarebyyes Anti-Malware for Mac formerly known as AdwareMedic. It's free.

     

    Make sure Mac App Store and identified developers is selected in System Preferences > Security & Privacy > General

     

    If you would rather not download Malwarebytes Anti-Malware, you can remove the malware manually following the instructions here >   Remove unwanted adware that displays pop-up ads and graphics on your Mac - Apple Support





    There's no need to to an Apple Store. They won't help you with with a scam issue.

  • by Allan Eckert,

    Allan Eckert Allan Eckert Aug 6, 2015 6:44 AM in response to gesty
    Level 9 (54,085 points)
    Desktops
    Aug 6, 2015 6:44 AM in response to gesty

    Change your passwords.

  • by gesty,

    gesty gesty Aug 6, 2015 7:59 AM in response to Allan Eckert
    Level 1 (0 points)
    Aug 6, 2015 7:59 AM in response to Allan Eckert

    OK thanks very much. Followed all your advice (apart from malwarebytes), but I'm still concerned their might be something nasty lurking in the mba, so I'll still keep my appointment & let someone who actually knows what they're doing & can look under the hood check everything is kosher.

     

    Thanks all.

  • by Linc Davis,

    Linc Davis Linc Davis Aug 6, 2015 9:41 AM in response to gesty
    Level 10 (208,037 points)
    Applications
    Aug 6, 2015 9:41 AM in response to gesty

    If you know or suspect that a hostile intruder has either had physical access or has taken control of it remotely, then there are some steps you should take to make sure that the computer is safe to use.

    Running any kind of "anti-virus" software is pointless. If I broke into a system and wanted to leave a back door, I could do it in a way that would be undetectable by those means—and I don't pretend to any special skill as a hacker. You have to assume that any intruder can do the same. For example, commercial keylogging software—which has legitimate as well as illegitimate uses—won't be recognized as malware, because it's not malware.

    The only way you can be sure that the computer is not compromised is to erase at least the startup volume and restore it to something like the state it was in before the attack. The easiest approach is to recover the entire system from a backup that predates the attack. Obviously, that's only practical if you know when the attack took place, and it was recent, and you have such a backup. You will lose all changes to data, such as email, that were made after the time of the snapshot. Some of those changes can be restored from a later backup.

    If you don't know when the attack happened, or if it was too long ago for a complete rollback to be practical, then you should erase and install OS X. If you don't already have at least two complete, independent backups of all data, then you must make them first. One backup is not enough to be safe.

    When you restart after the installation, you'll be prompted to go through the initial setup process for a new computer. That’s when you transfer the data from a backup in Setup Assistant.

    Select only users in the Setup Assistant dialog—not Applications, Other files and folders, or Computer & Network Settings. Don't transfer the Guest account, if it was enabled.

    Reinstall third-party software from original media or fresh downloads—not from a backup, which could be contaminated.

    Unless you were the target of an improbably sophisticated attack, this procedure will leave you with a clean system. If you have reason to think that you were the target of a sophisticated attack, then you need expert help.

    The above being done, change all Internet passwords and check all financial accounts for unauthorized transactions. Do this after the system has been secured, not before.

  • by cdhw,

    cdhw cdhw Aug 6, 2015 10:50 AM in response to gesty
    Level 4 (2,668 points)
    Servers Enterprise
    Aug 6, 2015 10:50 AM in response to gesty

    That looks like a UK number, in which case 'If you've received a potential scam message or computer virus but no money has been lost or you haven’t responded to it' you can report the attempt here:

     

         http://www.actionfraud.police.uk/report_fraud

     

    C.

  • by John Galt,

    John Galt John Galt Aug 6, 2015 1:00 PM in response to gesty
    Level 9 (50,389 points)
    Mac OS X
    Aug 6, 2015 1:00 PM in response to gesty

    brand new macb air ...

     

    So the good news is there's nothing on my mba yet except for contacts & photos when I synched with icloud,


    Confirm that the above statements mean your MBA is essentially new and unconfigured, other than having used it to store photos and contacts that now reside in iCloud and can be retrieved from there. If that is in fact the case, there is nothing on the MBA to lose, and you can certainly erase it. That would be the most prudent course of action, given the uncertainties regarding the remote access event you described. It would be entirely pointless to download and install anything to assure the absence of malicious system modifications, since it is impossible for any product to provide absolute assurance of that.

     

    To learn more about this kind of scam read Phony "tech support" / "ransomware" popups and web pages.

     

    I have an appointment at a Genius bar next week & I won't use the Mac again till then. Not even to change my Password.


    That's OK. Tell them what happened.

  • by John Galt,Solvedanswer

    John Galt John Galt Aug 6, 2015 1:04 PM in response to gesty
    Level 9 (50,389 points)
    Mac OS X
    Aug 6, 2015 1:04 PM in response to gesty

    ... & I told them about my Microsoft PC, which was on at the time. Is there any way they could access that over the wifi the mac was using?


    The short answer is yes... if you had already been using your Mac to remotely access and control your Windows PC over your network. If you had not already been doing that, the possibility becomes very unlikely.

  • by gesty,Helpful

    gesty gesty Aug 6, 2015 4:08 PM in response to John Galt
    Level 1 (0 points)
    Aug 6, 2015 4:08 PM in response to John Galt

    Yes, I came to the same conclusion & will be asking the genius crew to just wipe my mba & start over, as there is nothing really on it yet.

     

    And no, i wasn't using it to remotely control my PC, so thanks for confirming the unliklihood of any danger there.

     

    Again, thanks all for your comprehensive info, much appreciated.