Avoid getting scammed by fake "We Are Having Trouble With Firewall" sites
Written by Tomas Meskauskas on
What kind of scam is "We Are Having Trouble With Firewall"?
Our researchers discovered the "We Are Having Trouble With Firewall" scam while investigating dubious websites. It is a technical support scam that aims to trick victims into calling fake support lines by making bogus claims concerning their device security.
It must be emphasized that the information provided by this scheme is fake and it is in no way associated with Windows/Microsoft.
"We Are Having Trouble With Firewall" scam overview
The scam's website is presented as Microsoft's official website, which is overlaid by a pop-up. This window claims that there is an issue preventing the Windows Firewall from being set as the default on the visitor's device.
The pop-up provides a scan option that opens a new page with a window running an imitation of a system scan. Additionally, the webpage alerts that access to the system has been blocked for security reasons. Another pop-up requests the user to provide their Microsoft ID and password (which might be recorded and sent to scammers).
Once the scan is concluded, the visitor is presented with the "Microsoft Windows Locked Due To Unusual Activity" tech support scam.
It must be reiterated that the information provided is false, and this scam is not associated with the Windows operating system or its developer – the Microsoft Corporation.
Technical support scams are complex and can vary in how they operate. The first step is for victims to call the provided helpline. Usually, the second is to get them to permit remote access to their devices. While these schemes function differently, they pose significant threats.
Threats posed by tech support scammers
While tech support scammers can deceive victims into disclosing sensitive information, sending money, or downloading/installing software (including malware) – they typically involve remote access. The connection can be established using legitimate software like UltraViewer, TeamViewer, and similar programs.
Throughout the scam, cyber criminals tend to uphold the pretense of being technicians. To expand upon the harm they can cause, scammers can remove genuine security tools, install fake-anti-viruses, obtain private data, and infiltrate malware into the system (e.g., trojans, ransomware, etc.).
Targeted information can include log-in credentials (e.g., emails, social networking, online banking, digital wallets, etc.), personally identifiable details (e.g., ID card details, passport photos/scans, etc.), and finance-related information (e.g., banking account details, credit/debit card numbers, etc.).
All scams are motivated by financial gain, and these usually acquire victims' funds by presenting it as payment for services or subscriptions. In summary, victims can experience system infections, severe privacy issues, financial losses, and identity theft.
Detailed information on recognizing these schemes, how they operate, and what threats they pose – can be found in our dedicated article.
If you cannot exit a scam page – end the browser's process using Task Manager. Note that restoring the previous browsing session will reopen the deceptive website; hence, start a new one when relaunching the browser.
If you have allowed cyber criminals to access your device remotely – you must first disconnect it from the Internet and remove the remote access program used (as criminals might not need your consent to reconnect). Lastly, run a full system scan with an anti-virus and eliminate all detected threats.
Name | "We Are Having Trouble With Firewall" tech support scam |
Threat Type | Phishing, Scam, Social Engineering, Fraud |
Fake Claim | Windows Firewall cannot be set as the default. |
Disguise | Windows / Microsoft |
Tech Support Scammer Phone Number | +1-877-371-5233 |
Related Domains | windows[.]net |
Detection Names (windows[.]net) | ESET (Malware), Yandex Safebrowsing (Phishing), Full List Of Detections (VirusTotal) |
Serving IP Address (windows[.]net) | 20.60.43.238 |
Symptoms | Fake error messages, fake system warnings, pop-up errors, hoax computer scan. |
Distribution methods | Compromised websites, rogue online pop-up ads, potentially unwanted applications. |
Damage | Loss of sensitive private information, monetary loss, identity theft, possible malware infections. |
Malware Removal (Windows) | To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
Technical support scam examples
"(5) Virus/Malware infections have been detected", "Virus Alert (05261)", "Online Internet Banking Security Center", and "Error Updating Software: #009292w099738H98" are merely some of our latest articles on tech support scams.
The Internet is rife with deceptive and malicious content. Scams can differ greatly in appearance and modus operandi, yet their end goal is the same – to generate revenue at victims' expense.
While schemes can be poorly put together and riddled with errors, they can be competently made and even convincingly disguised as content associated with genuine entities. Therefore, always be vigilant.
How did I open a scam website?
Online scams are primarily promoted via webpages using rogue advertising networks, spam (e.g., emails, DMs/PMs, social media/ forum posts, browser notifications, SMSes, cold calls, robocalls, etc.), intrusive ads (malvertising), misspelled URLs (typosquatting), and adware.
How to avoid visiting scam websites?
Caution is essential to device and user safety. Therefore, be wary of websites/ads/messages/calls that scaremonger or make promises that sound too good to be true. Take note of URLs and enter them carefully.
Do not visit sites offering pirated programs/media or other dubious services (e.g., Torrenting, illegal streaming/downloading, etc.), as these webpages are usually monetized via rogue advertising networks. Do not enable suspect pages to display browser notifications; instead, ignore or deny their notification requests (i.e., click "Block", "Block Notifications", etc.).
Download only from official/verified sources and be attentive when installing (e.g., study terms and options, use "Custom/Advanced" settings, and opt out of additional apps, extensions, etc.) – to prevent bundled/harmful software (like adware) from infiltrating the system.
If your computer is already infected, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate all threats.
Text presented in "We Are Having Trouble With Firewall" pop-up:
Microsoft
We are having trouble with Firewall
Windows Firewall cannot be set as the default firewall. This problem may be occurring because of an existing Group Policy or because you are using other Security firewall program. If you want to use Windows Firewall, exit this troubleshooter, uninstall the other firewall program, and then run this troubleshooter again. Call us our Security Helpline: +1-877-371-5233 (TollFree)
Scan
[Run the windows scan to fit the problem]
Exit
[Exit the troubleshooter]
The appearance of "We Are Having Trouble With Firewall" pop-up scam (GIF):
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
- What is "We Are Having Trouble With Firewall" tech support scam?
- How to identify a pop-up scam?
- How do pop-up scams work?
- How to remove fake pop-ups?
- How to prevent fake pop-ups?
- What to do if you fell for a pop-up scam?
How to identify a pop-up scam?
Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.
While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.
Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:
- Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
- Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
- Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
- Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
- Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.
Example of a pop-up scam:
How do pop-up scams work?
Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.
Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.
How to remove fake pop-ups?
In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.
In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.
How to prevent fake pop-ups?
To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.
To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for Windows.
What to do if you fell for a pop-up scam?
This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.
- If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
- If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
- If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for Windows) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
- Help other Internet users: report Internet scams to Federal Trade Commission.
Frequently Asked Questions (FAQ)
What is a pop-up scam?
Basically, pop-up scams are deceptive messages that aim to trick users into performing specific actions. For example, victims can be enticed into calling fake support lines, permitting scammers to access devices remotely, making monetary transactions, providing sensitive information, downloading/installing software, purchasing products, subscribing to services, and so on.
What is the purpose of a pop-up scam?
The purpose of pop-up scams is to generate revenue for scammers. They can profit by obtaining funds through deception, promoting content (e.g., websites, products, services, etc.), selling/abusing private data, and spreading malware.
Why do I encounter fake pop-ups?
Pop-up scams are mainly endorsed via sites that use rogue advertising networks, intrusive ads (malvertising), spam (e.g., emails, DMs/PMs, browser notifications, SMSes, calls, etc.), misspelled URLs (typosquatting), and adware.
I cannot exit a scam page, how do I close it?
Should it be impossible to close a deceptive webpage – end the browser's process using Task Manager. If the previous browsing session is restored that will reopen the scam page; therefore, start a new one when relaunching the browser.
I have allowed cyber criminals to remotely access my computer, what should I do?
If you have allowed cyber criminals to access your device remotely – you must first disconnect it from the Internet. Afterward, uninstall the remote access software that the criminals used, as they might not need your consent to reconnect. Lastly, run a full system scan with an anti-virus and eliminate all detected threats.
I have provided my personal information when tricked by a pop-up scam, what should I do?
If you have provided your log-in credentials – change the passwords of all potentially exposed accounts and inform their official support without delay. However, if you've disclosed other private information (e.g., ID card details, passport scans/photos, credit/debit card numbers, etc.) – immediately contact the appropriate authorities.
Will Combo Cleaner protect me from pop-up scams and the malware they proliferate?
Combo Cleaner is designed to eliminate all kinds of threats. It can scan visited websites for deceptive/malicious content and restrict all further access to pages that host it. Additionally, Combo Cleaner can detect and remove most of the known malware infections. Keep in mind that performing a complete system scan is paramount since sophisticated malicious software typically hides deep within systems.
▼ Show Discussion