How to remove apps promoting the "Porn Site Virus" scam
Written by Tomas Meskauskas on (updated)
What kind of scam is "Porn Site Virus"?
"Porn Site Virus" is a scam message designed to scare and trick users into paying a ransom. Cyber criminals typically deliver this message via spam emails, however, some users continually encounter this message as a pop-up. This indicates the presence of adware-type apps.
Research shows that adware often infiltrates systems without consent. As well as displaying "Porn Site Virus" pop-ups, these programs are also likely to deliver intrusive advertisements and gather sensitive information.
More about the "Porn Site Virus" scam
This message states that the system has been infected after the user has purportedly visited a pornographic website. It also states that the malware has transferred various sensitive information to a server owned by the developer after activating the computer web cam and recording the user masturbating. It goes on to say that the video has been sent to a remote server.
Cyber criminals then attempt to blackmail victims - they threaten to share all compromising data together with the victim's personal contacts (that have apparently been stolen). To avoid this, victims are encouraged to pay several hundred dollars (in Bitcoins or another cryptocurrency). Once payments are submitted, all recorded information is supposedly deleted.
Be aware, however, that this is a scam. Cyber criminals attempt to extort money from gullible users. If you have received such an email, delete it immediately and forget about it. If, however, you see this message continually popping-up, there is a high probability that your computer is infected with an adware-type app.
More about rogue apps
Adware-type apps deliver coupons, banners, pop-ups, and other similar advertisements. To achieve this, developers employ various tools (e.g., "virtual layer") that enable placement of third party graphical content on any site. Therefore, the ads often conceal underlying content, thereby significantly diminishing the browsing experience.
Furthermore, these advertisements might lead to malicious websites and execute scripts that stealthily download and install other unwanted software or even malware. Therefore, even a single accidental click can result in high-risk computer infections. Another important issue is information tracking.
Research shows that potentially unwanted programs gather various information that usually includes personal data. Internet Protocol (IP) addresses, website URLs visited, pages viewed, search queries, and other collected data is later shared with third parties (potentially, cyber criminals) who often misuse private information to generate revenue.
Therefore, data tracking might lead to serious privacy issues or even identity theft. You are strongly advised to immediately eliminate all potentially unwanted programs immediately.
Name | Porn Site Virus Scam |
Threat Type | Phishing, Scam, Social Engineering, Fraud |
Fake Claim | A computer has been infected through a visited pornography page |
Cyber Criminal Cryptowallet Address | 1HoF4JravhUWkjxaeH8JMh1ntSqDqz4VvB |
Disguise | Letter from a hacker |
Distribution methods | |
Damage | Monetary loss |
Malware Removal (Windows) | To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
Similarities with other scams
"Porn Site Virus" is very similar to dozens of other fake error messages, such as Your Computer Might Be Infected By Trojans, Windows Malware Detected, and Google Chrome Support Centre.
All claim that the system is damaged (e.g., infected, missing files, and so on), however, these claims are merely attempts to trick users into calling fake tech support (and pay for unnecessary services) or downloading certain potentially unwanted programs (e.g., fake anti-virus suites).
Research shows that apps promoting scams are often very similar. By offering various "useful features", they attempt to give the impression of legitimacy, however, these apps are designed only to generate revenue for the developers. Rather than delivering any real value for regular users, such apps pose a direct threat to your privacy and Internet browsing safety.
How did unwanted programs install on my computer?
Potentially unwanted programs often infiltrate systems without consent. This is usually due to the lack of knowledge and careless behavior of many users. Rogue apps are typically distributed using intrusive advertisements and a deceptive marketing method called "bundling" (stealth installation of unwanted apps together with regular programs).
Developers know that users often rush download/installation processes and skip steps. Therefore, all information regarding modification of browser settings is hidden within "Custom/Advanced" settings (or other sections) of these procedures. Skipping download/installation steps and clicking various advertisements leads to inadvertent installation of various shady apps.
How to avoid installation of unwanted applications?
To prevent infiltration of unwanted apps, be very cautious when browsing the Internet and downloading/installing software. Carefully analyze each window of the download/installation dialogs and opt-out of all additionally-included programs. You are advised to download your programs from official sources only (via direct download links) rather than using third party downloaders/installers.
Developers monetize these tools by promoting ("bundling") unwanted apps. Therefore, these tools should never be used. Be aware that intrusive advertisements may seem legitimate, but most lead to dubious websites (gambling, adult dating, pornography, etc.) If you encounter these ads, immediately remove all dubious applications and browser plug-ins.
The key to computer safety is caution. If your computer is already infected with rogue apps, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate them.
Text presented in "Porn Site Virus" pop-up:
Good morning, my victim.
You read this letter because I put a malware on a porn site which you have gone on.
When you visited this site you let my virus grab all your personal data and switched on your web-camera that shoot the process of your masturbation. Then my virus made a copy of all your contacts.
I will not share this video and data if you send me 340 $ in bitcoin.
It is my bitcoin address to pay: 1HoF4JravhUWkjxaeH8JMh1ntSqDqz4VvB
I give you 24 h after clicking on this message to complete the payment.
There is no need to write me that you have sent money to me. This address was given only to you, my system will delete everything automatically after payment confirmation.
You can get 48 h just reply on this letter with +.
You can complain to the cops but nobody will help you.
I dont live in your country. So they can not catch me even for 2 months.
Bye. Dont forget about the ignominy.
Another variant of the same pop-up:
I seized virus on a porn site which you have visited. When the target tap on a play button, device begins recording the screen and all cameras on your device begins working.
Moreover, my virus makes a remote desktop supplied with key logger function from the device , so I was able to get all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail because It's your working address, so you must check it.
In my opinion 300 usd is pretty enough for this little misstep. I made a split screen vid(records from screen (u have interesting tastes ) and camera ohh... its awful AF)
So its ur choice, if u want me to delete ur disgrace use my bit??in wallet ?ddress- 14s8197QteTeXfbH9Tmsu43BE9xXjm mg8Z
You have one day after opening my message, I put the special tracking pixel in it, so when you will open it I will see.If ya want me to show u the proofs, reply on this letter and I will send my creation to five contacts that I've got from ur device.
P.S. U can try to complain to police, but I don't think that they can help, the inquisition will last for one year- I'm from Ukraine - so I dgf lmao
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
- What is Porn Site Virus?
- STEP 1. Uninstall deceptive applications using Control Panel.
- STEP 2. Remove adware from Internet Explorer.
- STEP 3. Remove rogue extensions from Google Chrome.
- STEP 4. Remove potentially unwanted plug-ins from Mozilla Firefox.
- STEP 5. Remove rogue extensions from Safari.
- STEP 6. Remove rogue plug-ins from Microsoft Edge.
Removal of potentially unwanted programs:
Windows 11 users:
Right-click on the Start icon, select Apps and Features. In the opened window search for the application you want to uninstall, after locating it, click on the three vertical dots and select Uninstall.
Windows 10 users:
Right-click in the lower left corner of the screen, in the Quick Access Menu select Control Panel. In the opened window choose Programs and Features.
Windows 7 users:
Click Start (Windows Logo at the bottom left corner of your desktop), choose Control Panel. Locate Programs and click Uninstall a program.
macOS (OSX) users:
Click Finder, in the opened screen select Applications. Drag the app from the Applications folder to the Trash (located in your Dock), then right click the Trash icon and select Empty Trash.
In the uninstall programs window, look for any suspicious/recently-installed applications, select these entries and click "Uninstall" or "Remove".
After uninstalling the potentially unwanted program, scan your computer for any remaining unwanted components or possible malware infections. To scan your computer, use recommended malware removal software.
Remove rogue extensions from Internet browsers:
Video showing how to remove potentially unwanted browser add-ons:
Remove malicious add-ons from Internet Explorer:
Click the "gear" icon (at the top right corner of Internet Explorer), select "Manage Add-ons". Look for any recently-installed suspicious browser extensions, select these entries and click "Remove".
Optional method:
If you continue to have problems with removal of the "porn site virus" scam, reset your Internet Explorer settings to default.
Windows XP users: Click Start, click Run, in the opened window type inetcpl.cpl In the opened window click the Advanced tab, then click Reset.
Windows Vista and Windows 7 users: Click the Windows logo, in the start search box type inetcpl.cpl and click enter. In the opened window click the Advanced tab, then click Reset.
Windows 8 users: Open Internet Explorer and click the gear icon. Select Internet Options.
In the opened window, select the Advanced tab.
Click the Reset button.
Confirm that you wish to reset Internet Explorer settings to default by clicking the Reset button.
Remove malicious extensions from Google Chrome:
Click the Chrome menu icon (at the top right corner of Google Chrome), select "More tools" and click "Extensions". Locate all recently-installed suspicious browser add-ons and remove them.
Optional method:
If you continue to have problems with removal of the "porn site virus" scam, reset your Google Chrome browser settings. Click the Chrome menu icon (at the top right corner of Google Chrome) and select Settings. Scroll down to the bottom of the screen. Click the Advanced… link.
After scrolling to the bottom of the screen, click the Reset (Restore settings to their original defaults) button.
In the opened window, confirm that you wish to reset Google Chrome settings to default by clicking the Reset button.
Remove malicious plug-ins from Mozilla Firefox:
Click the Firefox menu (at the top right corner of the main window), select "Add-ons". Click on "Extensions", in the opened window, remove all recently-installed suspicious browser plug-ins.
Optional method:
Computer users who have problems with "porn site virus" scam removal can reset their Mozilla Firefox settings.
Open Mozilla Firefox, at the top right corner of the main window, click the Firefox menu, in the opened menu, click Help.
Select Troubleshooting Information.
In the opened window, click the Refresh Firefox button.
In the opened window, confirm that you wish to reset Mozilla Firefox settings to default by clicking the Refresh Firefox button.
Remove malicious extensions from Safari:
Make sure your Safari browser is active, click Safari menu, and select Preferences....
In the opened window click Extensions, locate any recently installed suspicious extension, select it and click Uninstall.
Optional method:
Make sure your Safari browser is active and click on Safari menu. From the drop down menu select Clear History and Website Data...
In the opened window select all history and click the Clear History button.
Remove malicious extensions from Microsoft Edge:
Click the Edge menu icon (at the upper-right corner of Microsoft Edge), select "Extensions". Locate all recently-installed suspicious browser add-ons and click "Remove" below their names.
Optional method:
If you continue to have problems with removal of the "porn site virus" scam, reset your Microsoft Edge browser settings. Click the Edge menu icon (at the top right corner of Microsoft Edge) and select Settings.
In the opened settings menu select Reset settings.
Select Restore settings to their default values. In the opened window, confirm that you wish to reset Microsoft Edge settings to default by clicking the Reset button.
- If this did not help, follow these alternative instructions explaining how to reset the Microsoft Edge browser.
Summary:
Commonly, adware or potentially unwanted applications infiltrate Internet browsers through free software downloads. Note that the safest source for downloading free software is via developers' websites only. To avoid installation of adware, be very attentive when downloading and installing free software. When installing previously-downloaded free programs, choose the custom or advanced installation options – this step will reveal any potentially unwanted applications listed for installation together with your chosen free program.
Post a comment:
If you have additional information on "porn site virus" scam or it's removal please share your knowledge in the comments section below.
Frequently Asked Questions (FAQ)
Why did I receive this email?
Usually, scammers use emails that have been leaked after data breaches. Their emails are not personal. Also, they send the same email to all recipients.
I have provided my personal information when tricked by a phishing email, what should I do?
It depends on the type of information you have provided. If you provided your login credentials (username, ID, email address, password), change your passwords as soon as possible. Especially if you are using the same password for more than one account. In other cases, contact the corresponding authorities.
I have downloaded and opened a malicious attached to an email, is my computer infected?
Malicious executables infect computers right after they are opened/executed. Archive files, MS Office, PDF documents, and certain other files cannot infect computers without performing two or more actions (e.g., opening a document and enabling macros commands).
Is my computer actually hacked and does the sender have any information?
No, your computer is not compromised (hacked or infected). Scammers only claim that they have accessed your computer (or infected it with malware). In some cases, they mention old passwords (that have been actually used by recipients) to make their claims more believable.
I have sent cryptocurrency to the address presented in such email, can I get my money back?
It is not possible to retrieve the transferred funds. Cryptocurrency transactions are irreversible.
I have read the email but did not open the attachment, is my computer infected?
Your computer is not infected. No damage can be caused via email unless received links or attachments are opened.
Will Combo Cleaner remove malware infections that were present in email attachment?
Yes, Combo Cleaner can detect almost all known malware. Computers infected with high-end malware must be scanned using a full scan.
▼ Show Discussion