Avoid downloads from apple.com-mac-optimizer.icu
Written by Tomas Meskauskas on (updated)
What is apple.com-mac-optimizer[.]icu?
apple.com-mac-optimizer[.]icu is one of many scam websites, in this case, used to trick people into downloading and installing Cleanup My Mac, an application designed to remove viruses that this deceptive web page has supposedly detected. Do not install apps that are advertised on scam websites - messages about so-called 'detected viruses' are fake.
Browsers usually open websites such as apple.com-mac-optimizer[.]icu due to potentially unwanted applications (PUAs) installed on them or the MacOS system. I.e., people do no generally visit these sites intentionally.
When opened, apple.com-mac-optimizer[.]icu displays a pop-up window, a fake notification stating that the site has detected a trojan virus ("e.tre456_worm_osx"). Visitors are encouraged to remove this virus immediately. The background web page states that the operating system is infected with three viruses: two malware and one phishing/spyware virus.
It also states that system damage is at 28.1% and personal and banking information is at risk. To prevent further damage such as data loss, visitors must scan their systems by clicking the "Scan Now" button. The apple.com-mac-optimizer[.]icu site then starts a fake scan, which detects viruses called Tapsnake, CronDNS, and Dubfishicv.
If clicked, the "REMOVE VIRUSES NOW" button downloads the maccleaner.pkg file, which is an installer (setup file) of the Cleanup My Mac application. We strongly advise you not to download or install this file.
This app is probably useless and not free of charge. In summary, there is a high probability that developers promote this app to deceptively extort money from unsuspecting people. If the browser opens apple.com-mac-optimizer[.]icu or another scam page, ignore the site and close it.
Generally, browsers open pages such as apple.com-mac-optimizer[.]icu due to PUAs installed on them. These apps force users to visit untrustworthy web pages, collect user-system information and display intrusive ads.
PUAs gather data relating to users' browsing habits such as IP addresses, geolocations, addresses of visited websites, entered search queries, and other personal details. People behind these apps share the data with other parties (potentially, cyber criminals) who misuse it to generate revenue.
Furthermore, PUAs often display intrusive ads such as coupons, banners, surveys, and pop-up ads. People who click them are usually redirected to untrustworthy websites such as apple.com-mac-optimizer[.]icu or this allows the ads to download or install other PUAs.
Name | Apple.com-mac-optimizer.icu pop-up |
Threat Type | Mac malware, Mac virus |
Fake Claim | This scam page claims that it has detected a virus and encourages visitors to remove it immediately. |
Promoted Unwanted Application | Cleanup My Mac |
Detection Names (apple.com-mac-optimizer[.]icu) | Full List Of Detections (VirusTotal) |
Symptoms | Your Mac becomes slower than normal, you see unwanted pop-up ads, you are redirected to dubious websites. |
Distribution methods | Deceptive pop-up ads, free software installers (bundling), fake flash player installers, torrent file downloads. |
Damage | Internet browser tracking (potential privacy issues), display of unwanted ads, redirects to dubious websites, loss of private information. |
Malware Removal (Mac) | To eliminate possible malware infections, scan your Mac with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
Note that apple.com-mac-optimizer[.]icu is similar to apple.com-shield-guard[.]live, apple.com-shield[.]live, apple.com-shield-devices[.]live, and many other sites. Typically, scammers use these web pages to promote dubious applications.
They design them to display fake notifications about 'detected viruses' and attempt to trick people into installing unwanted apps (that supposedly remove the viruses). PUAs responsible for redirects to scam pages are generally very similar - they provide no 'useful features' and are designed only to open dubious web pages, gather data, and/or display unwanted ads.
How did potentially unwanted applications install on my computer?
In some cases, PUAs can be downloaded from their 'official' download websites, however, people usually download and install them inadvertently/accidentally through clicked deceptive ads or the set-ups of regular programs that were downloaded from the internet.
Typically, developers include PUAs in download/installation set-ups and hide related information in options such as "Custom, "Advanced", and so on. Unfortunately, many people fail to check and change these settings. Typically, PUAs are downloaded and/or installed when the settings available in various set-ups are left unchanged.
How to avoid installation of potentially unwanted applications
Download and install software with care. When downloading software, use only official, trustworthy sources and direct links. Avoid using third party downloaders such as torrents, and so on. Check "Custom", "Advanced" and other similar settings when installing software, especially if it is free.
Deselect offers to install unwanted apps and only then finish the installation process. Avoid clicking intrusive ads, especially those displayed on untrustworthy websites. If you encounter various ads that redirect you to gambling, adult dating, and other untrustworthy websites, check your browser and list of installed programs.
Remove any unknown/unwanted entries (extensions, add-ons, plug-ins, etc.). If your computer is already infected with PUAs, we recommend running a scan with Combo Cleaner Antivirus for macOS to automatically eliminate them.
Text in the pop-up window:
IMMEDIATE ACTION REQUIRED
We have detected a trojan virus (e.tre456_worm_osx) on your Mac.
Press OK to begin the repair process.
Screenshot of the background page:
Text in this page:
Your system is infected with 3 viruses! Monday, September 2, 2019 5:04 PM
Your Mac is infected with 3 viruses. Our security check found traces of 2 malware and 1 phishing/spyware. System damage: 28.1% - Immediate removal required!
The immediate removal of the viruses is required to prevent further system damage, loss of Apps, Photos or other files.
Traces of 1 phishing/spyware were found on your Mac with MacOS 10.14 Mojave.Personal and banking information is at risk.
To avoid more damage click on 'Scan Now' immediately. Our deep scan will provide help immediately!
4 minute and 0 seconds remaining before damage is permanent.
Screenshot of fake scan results:
Text in this page:
DOWNLOAD REQUIRED
Your Mac is heavily damaged! (33.2%)
Please download the Advanced Mac Cleaner application to remove 3 Viruses from your Mac.
VIRUS INFORMATIONVirus Name: Tapsnake; CronDNS; Dubfishicv
Risk: HIGH
Infected Files: /os/apps/hidden/os-component/X/snake.icv; /os/local/conf/keyboard/retype.icv...
REMOVE VIRUSES NOW
VIRUS REMOVALApplication: Advanced Mac Cleaner
Rating: 9.9/10
Price: Free
Appearance of apple.com-mac-optimizer[.]icu scam (GIF):
Screenshot of the Cleanup My Mac potentially unwanted app:
Instant automatic Mac malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of Mac malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner for Mac
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
- What is Apple.com-mac-optimizer.icu pop-up?
- How to identify a pop-up scam?
- How do pop-up scams work?
- How to remove fake pop-ups?
- How to prevent fake pop-ups?
- What to do if you fell for a pop-up scam?
How to identify a pop-up scam?
Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.
While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.
Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:
- Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
- Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
- Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
- Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
- Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.
Example of a pop-up scam:
How do pop-up scams work?
Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.
Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.
How to remove fake pop-ups?
In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.
In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.
How to prevent fake pop-ups?
To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.
To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for macOS.
What to do if you fell for a pop-up scam?
This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.
- If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
- If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
- If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for macOS) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
- Help other Internet users: report Internet scams to Federal Trade Commission.
▼ Show Discussion