Our members are reporting an increase in spoofing attempts. If you receive a call from Amplify asking for secure account information, please hang up and call our contact center directly at (512) 836-5901.

Due to scheduled maintenance, Card Controls (Cardhub) will be unavailable
from 5AM – 8AM CT on January 28th, 2026.

How Do Computer Virus Scams Work

Katie DuncanOctober 8, 2025

Reviewed By: Bruce Smith, Information Security Officer

Computer virus scams are still one of the most common—and convincing—forms of online fraud today.  

While the tactics have evolved over the years, the goal has remained the same: to gain your trust long enough to get access to your device or financial accounts. And they work—tens of thousands of people report falling victim to them each year, often losing hundreds or even thousands of dollars. 

To better understand how these scams work and how to protect yourself, we turned to Bruce Smith, Amplify’s very own Information Security Officer. With experience tracking fraud trends and educating consumers, Bruce offers valuable insight into the warning signs, prevention strategies, and steps to take if you’ve been targeted. 

What is a computer virus scam? 

A computer virus scam—also called a ”phantom hacker” scam—is a type of fraud where criminals try to make you believe your device has been infected with malware or a virus. They might claim your computer is “critically compromised” or that your software is “dangerously out of date,” creating a sense of urgency so you’ll act quickly. 

In most cases, there’s no virus at all. The warning is fake, and the real goal is to pressure you into paying for unnecessary “repairs,” sharing sensitive information like passwords or bank details, or granting remote access to your device so the scammer can steal your data directly. 

These scams can take several forms: 

  • Pop-up alerts that appear while you’re browsing the internet, warning of a “critical infection” and urging you to act immediately. 
  • Fake tech support calls from someone claiming to work for well-known companies like Microsoft or Apple. 
  • Emails or text messages that direct you to fraudulent websites posing as legitimate antivirus providers. 

These scams are a form of social engineering— techniques designed to manipulate people into giving up personal or financial information. 

“If you’re a computer user not well versed in how these scams work, it’s easy to become alarmed when a so-called technician calls to alert you that your system has been infected,” Bruce explains. 

Fraudsters are adept at creating a sense of urgency. That pressure can lead people to take actions they normally wouldn’t, like granting remote access or sharing passwords. Whether the scam involves a fake phone call or a fraudulent pop-up, the objective is the same: to gain your trust through deception so the scammer can steal your information, your money, or both. 

How do computer virus scams work? 

While there are many variations, most computer virus scams follow a similar playbook. 

  1. The setup: Scammers make the first contact through a fake pop-up, an unsolicited phone call, or a phishing email. 
  2. Building trust: Once they have your attention, the scammer works to convince you to allow them to remotely access your computer. This trust-building may involve walking you through harmless parts of your device to “prove” it’s infected or showing you fabricated error messages. 
  3. Gaining access: The scammer may then ask for passwords or other information that gives them direct access to your systems. Once inside, they may download a real virus, allowing them to steal your personal information and passwords. They may also demand payment for their services via your online banking, credit card, or gift card. 
  4. Taking the money: Some scams stop after the payment. Others keep going—using their access to install malware, capture more personal data, or even lock you out of your own files until you pay a ransom. 

    The FBI’s 2024 Internet Crime Report logged over 36,000 complaints for this type of scam. While that may seem small compared to the 859,532 total complaint cases in 2024, the impact can be devastating.  

    These scams are ever-evolving and may include more than one imposter working as a team to gain your trust and obtain access to your systems and financial accounts. Take a look at this alert from the FBI detailing how multi-staged scams operate.  

    How to Protect Yourself from Computer Virus Scams 

    The best defense against a computer virus scam is knowing the warning signs and taking steps to avoid them. Scammers rely on urgency, fear, and the appearance of legitimacy to trick you into acting without thinking.  

    By slowing down and verifying before you respond, you can protect yourself and your information

    • Be skeptical of unsolicited warnings: Never trust pop-ups, emails, or phone calls that claim your device is infected. 
    • Never give remote access: Only allow trusted, in-person tech support to handle your device, and verify their credentials. 
    • Verify before you act: If you receive a suspicious call or pop-up, end the interaction and contact the company directly using information from their official website. 
    • Block pop-ups in your browser: This can help prevent one of the most common scam entry points. 
    • Keep your systems updated: Install security updates for your operating system and apps to protect against real malware threats. 

    What to Do If You’ve Been Targeted by a Computer Virus Scam 

    If you think you’ve encountered a computer virus scam—whether you clicked on a pop-up, gave remote access, or shared personal information—acting quickly can help limit the damage. 

    Bruce recommends taking these steps right away: 

    1. Disconnect from the internet. 

    If a scammer had remote access to your device or you downloaded suspicious software, your first step is to sever the connection.  

    “Disconnect your device from the internet and your home WiFi if you believe your device has been infected with malware,” Bruce advises. This can stop scammers from continuing to access your computer in real time. 

    2. Run a trusted antivirus scan. 

    Once your device is offline, scan it using reputable antivirus software— never the program the scammer told you to install. This helps you determine if any actual malware is present. 

    “Conduct a full virus scan using reputable software like Microsoft Defender,” Bruce explains. “Never rely on the fraudsters telling you that you are infected.”  

    3. Get your device checked by a local professional. 

    If you’re still unsure whether your device is safe, bring it to a trusted, in-person technician. Avoid anyone who reaches out online or offers to run a remote scan.  

    4. Contact your financial institution. 

    Reach out to your bank or credit union immediately to secure your accounts. Ask them to place a fraud alert or issue new cards right away. This helps prevent further unauthorized transactions while you investigate the situation. 

    5. Freeze your credit. 

    Placing a freeze on your credit can prevent scammers from opening new accounts in your name.  

    “Visit the major credit bureaus—TransUnionExperianEquifax—and place a freeze on your credit,” Bruce says. “These credit agencies should provide this service online, giving you the ability to un-freeze your credit when you need it.” 

    6. Change your passwords. 

    Once your device is secure, update passwords for your bank, email, and social media accounts, preferably from a different device. This ensures that any credentials you gave away or that were stolen can’t be used. 

    7. Report financial losses. 

    “If you lose money, file a police report to help prevent others from falling victim,” notes Bruce. You can also file a report through the Federal Trade Commission or the FBI’s Internet Crime Complaint Center

    8. Monitor your accounts and credit reports. 

    Even after taking all the above steps, keep an eye out for suspicious activity. Regular monitoring can help you catch and address new fraud attempts before they escalate. 

    Final Thoughts 

    Computer virus scams rely on one powerful tactic: fear. By creating a sense of urgency and pretending to be a trusted authority, scammers trick people into handing over money, personal information, or access to their devices.  

    But as Bruce says, “Forewarned is forearmed.”  

    By understanding how these scams work, recognizing their warning signs, and knowing exactly what to do if you’re targeted, you can protect yourself and your information. Simple steps—like running your own antivirus scans, verifying any warnings, and avoiding unsolicited tech support offers—can go a long way toward keeping your devices secure. 

    This article was first published on August 6, 2018.

    Become an Amplify Member

    Every Amplify account holder enjoys fee-free banking. That means no overdraft, maintenance, or other banking fees cutting into your pocket.

     

    Katie Duncan

    Katie Conley is a financial writer based in Austin, Texas. Her articles include financial advice for freelancers, homebuyers, and more. When she’s not writing, Katie loves traveling and exploring the outdoors with her friends and her dog, Poe.