Scam Identification

Fake Antivirus and Scareware: When Security Warnings Are the Threat

By AntiPhishers Published

Fake Antivirus and Scareware: When Security Warnings Are the Threat

Security Education: This article describes cyber threats for defensive awareness and education purposes only. Understanding how attacks work helps organizations and individuals protect themselves. Never use this information for unauthorized access or malicious purposes.

Scareware exploits fear of computer infections to sell fake security software or trick you into installing actual malware. A browser popup screams that your computer is infected with 47 viruses. An alarming notification warns that your personal data is being stolen. These alerts are fake, but they are designed to trigger panic that overrides critical thinking, leading victims to pay for useless software, install malware, or grant remote access to scammers.

How Scareware Works

Browser-based scareware displays alarming popups through malicious ads on legitimate websites (malvertising) or compromised pages. The popup mimics Windows Security Center, Norton, McAfee, or Microsoft Defender with fake scan results showing dozens of “detected” threats. It may include flashing red warnings, countdown timers, and audio alerts. The page often uses JavaScript to make the browser appear frozen or to block the close button, simulating a genuine system lockup.

The popup includes a phone number (connecting to a tech support scam operation) or a download link for “antivirus software” that is actually malware. Some scareware infections come as browser extensions that continuously display fake warnings until you purchase the “full version.”

Fake antivirus software takes this further. Once installed, the program runs fake scans showing alarming results and demands payment ($30 to $100) for the “full version” to remove the threats. The software is entirely fraudulent; it detects nothing and protects nothing. Examples include SpySheriff, WinFixer, and MS Antivirus (not from Microsoft). Some fake AV programs actually disable your real antivirus software, leaving you more vulnerable.

Malware disguised as antivirus. The most dangerous variant installs a trojan, ransomware, or information stealer while pretending to be a security tool. The victim believes they are improving their security while actually compromising it completely.

Recognizing Scareware

No website can scan your computer for viruses. Any webpage claiming to have detected threats is lying. Legitimate antivirus software does not alert you through browser popups. Real security warnings from Windows, macOS, or your installed antivirus appear in system notifications, not web pages.

Red flags include: browser popups with virus warnings, countdown timers creating urgency, warnings that block your browser or claim your computer is locked, phone numbers in security alerts, and requests to download security software from unfamiliar sources.

Response Actions

Do not call the number or download anything. Close the browser tab. If the page prevents closing, force-quit the browser (Ctrl+Alt+Delete > Task Manager on Windows, Cmd+Option+Escape on Mac). Clearing browser cache after force-quitting prevents the page from reloading.

If you installed fake AV software, uninstall it immediately. Run a scan with a legitimate tool like Malwarebytes (free) or your operating system’s built-in protection (Windows Defender, XProtect). Check for other programs the fake AV may have installed.

If you gave remote access or payment, follow the response steps in our tech support scam guide. Cancel payment, run malware scans, and change passwords.

For more on browser-based threats and how to configure browser security, see our browser security settings guide. To understand the malvertising that delivers scareware, explore our ad blockers and privacy extensions guide.

Prevention Through Browser Hardening

The most effective prevention against scareware is blocking the malicious ads that deliver it. Install uBlock Origin to block malvertising before it loads. Enable popup blocking in your browser settings. Keep your browser updated to patch vulnerabilities that drive-by download attacks exploit.

If you encounter a scareware popup that locks your browser, remember that no website can actually lock your computer. The popup is using JavaScript tricks to make it appear that your browser or system is frozen. Force-quitting the browser through Task Manager (Ctrl+Alt+Delete on Windows) or Force Quit (Cmd+Option+Escape on Mac) will close the popup. After force-quitting, clear your browser cache and history to prevent the page from reloading when you restart the browser.