Apple Support Alert POP-UP Scam (Mac)
Written by Tomas Meskauskas on (updated)
What is "Apple Support Alert"?
Identical to "VIRUS ALERT FROM APPLE", "Apple Support Alert" is a fake error message delivered by deceptive websites. Research shows that many users arrive at these sites inadvertently - they are redirected by potentially unwanted applications (PUAs) or intrusive advertisements displayed on other rogue sites.
PUAs usually infiltrate systems without permission and, as well as causing directs, gather information and deliver intrusive ads.
The "Apple Support Alert" error essentially states that the system is blocked for the following reasons: the computer is proliferating viruses; pirated software is being used; The Mac registration key is illegal, or; the computer is hacked or being used from an "undefined" location.
The pop-up is followed by a message encouraging users to contact Apple 'tech support' (via the "+86672265620" telephone number) to resolve all issues. In addition, the rogue site continually downloads a single file called "This is a VIRUS.You computer is blocked", which itself is harmless and can be deleted without any consequences.
Be aware, however, that "Apple Support Alert" is fake and Apple is certainly not involved in this scam. In fact, cyber criminals attempt to trick gullible users into calling and paying for services (tech support) that are not required - the system is often safe and virus free.
Therefore, you should ignore the "Apple Support Alert" error and certainly do not call the aforementioned telephone number. You can remove this error simply by leaving the website. In some cases, rogue sites use scripts that disable closing of browsing tabs/windows.
In these cases, terminate the browser using Activity Monitor or reboot the system. Do not restore the previous session, since you will end up re-opening the malicious websites.
Potentially unwanted applications continually gather information relating to browsing activity. Recorded data (IP addresses, search queries, keystrokes, pages viewed, URLs visited, and so on) usually includes personal details that are shared with third parties and misused to generate revenue.
Therefore, information tracking can lead to serious privacy issues or even identity theft. Potentially unwanted applications are also notorious for display of intrusive advertisements. Ads are deployed using tools that enable placement of third party graphical content on any site.
They often conceal underlying content, significantly diminishing the browsing experience. They might also redirect to malicious websites and execute scripts designed to download and install malware. Therefore, even a single accidental click can lead to system infections. Uninstall all potentially unwanted applications immediately.
Name | "Apple Support Alert" virus |
Threat Type | Mac malware, Mac virus |
Symptoms | Your Mac became slower than normal, you see unwanted pop-up ads, you get redirected to shady websites. |
Distribution methods | Deceptive pop-up ads, free software installers (bundling), fake flash player installers, torrent file downloads. |
Damage | Internet browsing tracking (potential privacy issues), displaying of unwanted ads, redirects to shady websites, loss of private information. |
Malware Removal (Mac) | To eliminate possible malware infections, scan your Mac with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
The internet is full of fake error messages similar to "Apple Support Alert" including "Your Registration Key Is Blocked", "Your Computer Is Permanently Blocked", and "Your Mac Might Be Infected!" - these are just some examples from many. All claim that the system is damaged, however, these are merely attempts to extort money from unsuspecting users.
Unwanted apps also share many similarities. By offering 'useful features', they attempt to give the impression of legitimacy, however, their only purpose is to generate revenue for the developers. Rather than enabling any features, unwanted apps pose a direct threat to your privacy and browsing safety.
How did potentially unwanted applications install on my computer?
Some unwanted applications have official download websites, however, due to the lack of knowledge and careless behavior of many users, unwanted apps often infiltrate systems without permission, since developers proliferate them using intrusive advertising and "bundling" methods. "Bundling" is stealth installation of unwanted apps with regular software.
"Bundled" apps are concealed within various sections of the download/installation processes. In addition, many users often rush these procedures, skip steps, and click various advertisements without understanding the possible consequences. This behavior often leads to inadvertent installation of rogue applications.
How to avoid installation of potentially unwanted applications?
To prevent this situation, be very cautious when browsing the internet and downloading/installing software. Study each step of the download/installation processes using the "Custom" or "Advanced" settings. Cancel offers to download or install additional software and deselect those already included.
We recommend that you avoid using unofficial downloaders/installers, since most "bundle" unwanted apps. Download software from official sources only, using direct download links.
Remember that intrusive advertisements usually seem legitimate, since developers invest time and money into their design, however, most redirect to dubious websites, such as gambling, adult dating, pornography, and similar. If you encounter these redirects, immediately check the list of installed programs/browser plug-ins and eliminate any suspicious entries.
The key to computer safety is caution. If your computer is already infected with PUAs, we recommend running a scan with Combo Cleaner Antivirus for macOS to automatically eliminate them.
Text presented in "Apple Support Alert" scam:
VIRUS ALERT FROM APPLE
This computer is BLOCKED
Do not close this window and restart your computer
Your computer's registration key is Blocked.
Why we blocked your computer?
The mac's registration key is illegal.
This mac is using pirated software.
This mac is sending virus over the internet.
This mac is hacked or used from undefined location.
We block this computer for your security.
Contact apple helpline to reactivate your computer.
BLOCKED
Apple Support Alert
Your System Detected Some unusual Activity
It might harm your computer data and track your financial activities.
Please report this activity to +86672265620
Appearance of "Apple Support Alert" scam (GIF):
"This is a VIRUS.You computer is blocked" file downloaded by rogue websites that display "Apple Support Alert" scam:
Another variant of "Apple Support Alert" pop-up scam (uses +1-888-441-0333 phone number):
Text presented in the pop-up:
VIRUS ALERT FROM APPLE
This Mac computer is BLOCKED
Do not close this warning or restart your Mac
Your Mac's registration key is Blocked
Why we blocked your Mac Computer?
The Mac's registration key is illegal.
This Mac is using pirated software.
This Mac is sending virus over the internet.
This Mac is hacked or used from undefined location.
We block this Mac for your security.
Contact Apple helpline to reactivate your Mac.
Appearance of this website (GIF):
Yet another varaiant of "Apple Support Alert" pop-up scam (crooks use "+1-844-320-5222" telephone number):
Text presented within this pop-up:
VIRUS ALERT FROM APPLE
This computer is BLOCKED
The window's registration key is illegal.
This window is using pirated software.
This window is sending virus over the internet.
This window is hacked or used from undefined location.
We block this computer for your security.
Contact Apple helpline to reactivate your computer.
Apple Support Alert
Your System Detected Some unusual Activity
It might harm your computer data and track your financial activities.
Please report this activity to +1-844-320-5222
Instant automatic Mac malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of Mac malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner for Mac
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
- What is "Apple Support Alert" virus?
- How to identify a pop-up scam?
- How do pop-up scams work?
- How to remove fake pop-ups?
- How to prevent fake pop-ups?
- What to do if you fell for a pop-up scam?
How to identify a pop-up scam?
Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.
While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.
Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:
- Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
- Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
- Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
- Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
- Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.
Example of a pop-up scam:
How do pop-up scams work?
Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.
Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.
How to remove fake pop-ups?
In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.
In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.
How to prevent fake pop-ups?
To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.
To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for macOS.
What to do if you fell for a pop-up scam?
This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.
- If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
- If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
- If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for macOS) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
- Help other Internet users: report Internet scams to Federal Trade Commission.
▼ Show Discussion