“I made this just for you”
The “I made this just for you” message on Instagram is a scam. If you open the link sent in the message you will be redirected to a page very similar to the login screen of Instagram, once you enter you account and password in the space given you will be exposed to an unknown potential threat.
In this article, you will find important details about “I made this just for you” and the possible problems you may face due to its activities. If you are looking for more than that, then you probably will be interested in how to remove the Trojan from your system. That’s why, apart from the information in the next paragraphs, below we have added a removal guide to help you deal with the malware once and for all.
“I made this just for you” Instagram Scam
If you have received a message on Instagram saying “I made this just for you” it means you are a victim of a scam attempt. Clicking on the link will open a page which will ask for your account information, do not type anything or your system will be exposed to a potential threat.
Every Trojan horse can be used for many different criminal purposes. Often, the hackers who control the infection use it as a tool for personal data theft. A Trojan such as “I made this just for you” can be designed to simply copy and steal passwords, login details and/or credentials to bank accounts and transfer them to remotely-controlled servers. This malware can also log and keep copies of your keystrokes, take screenshots of things on your screen and monitor your online activities such as the websites you visit, the videos you see, etc. This allows the criminals who control the Trojan to steal someone’s information or identity and perform crimes or their behalf or directly abuse them.
“I made this just for you” Instagram Scam Removal
If you have an iPhone virus, continue with the guide below.
If you have an Android virus, please use our Android Malware Removal guide.
If you have a Mac virus, please use our How to remove Ads on Mac guide.
If you have a Windows virus, please use our Windows Virus Removal guide.
First you need to close all pop-ups that are currently open.
- If the pop-up has a checkbox named “Don’t show more alerts from this webpage” click on the checkbox before closing the Ad.
- If a Block Alerts button happens to appear after you shut down a pop-up on your iPhone, iPad, or iPod touch tab that button to stop receiving alerts from the same page.
In case that a pop-up fails to close after performing the above operations:
- On your Mac you should make your Safari browser close forcibly by pressing Command-Option-Esc. Select Safari from the list of Apps and force close it. After you force close it you need to restart Safari, but please hold the shift button while it starts. This will prevent any pesky Ads from opening automatically.
- On your iPhone, iPad, or iPod touch you can do the same by pressing the home button twice in a quick succession. You’ll then see a preview of all apps that have been recently used. Swipe left to find Safari and then swipe up on the app’s preview to close it forcibly In order to prevent Safari from opening unwanted windows on startup go to Settings->Safari and Clear History, as well as Website Data. This will also clear your browser history and cookies so keep that in mind and export them if you want to keep them.
Choose Preferences from the Safari menu. Then do the following:
- Select the Security icon and then click on “Block pop-up windows“. This should stop many types of pop-ups from appearing.
- Next check on your homepage and the settings for the search engines. Adware likes messing with those. We can not provide more specific instructions for this, as you may be using many different browsers.
- Select the General icon and look at the Homepage field. It should either be empty or filled with the address of the Homepage you want.
- Follow up on the Search icon. Again it should be either the default search engine or any that you have set for yourself. Note that in some versions of Safari these settings are found in the General panel/
Open Safari and click on the Extensions button. Note that Adware use extensions almost exclusively to inject the pop-up Ads into your browser. Any extension on this list that you do not remember installing yourself is likely planted there by the Adware. Remove ALL extensions you are unfamiliar with.
|Name||“I made this just for you”|
|Danger Level||High (Trojans are often used as a backdoor for Ransomware)|
|Symptoms||Symptoms of the Trojan infection may be absent since this type of malware hides its traces well and doesn’t show visible indications of its criminal activities.|
|Distribution Method||Infected links and web ads, malicious email attachments, spam messages, torrents, pirated software, low-qualiltly websites.|
Other Information about Trojan Horses
By definition, any malicious software that enters a device by misleading users about its true intentions and abilities can be considered a Trojan horse. All the Trojans have one thing in common: they are usually used by hackers to stealthily access a computer and launch different criminal activities in it without the victim’s knowledge. There are many sneaky ways in which hackers may render an infection like “I made this just for you” part of your machine. The malware may come from free software packages that have been compromised, or from infected e-mail letters and attachments. However, there are many suspicious web pages that actively distribute Trojans and if you land on some of them, you may get infected in a matter of seconds. In general, threats like “I made this just for you” can use the vulnerable spots in a computer system or any installed program. These could often be outdated applications, the absence of recent OS security patches or the absence of high-quality antivirus software.
A very important thing that needs to be mentioned about most Trojan-based infections is that they can often serve as a backdoor to other infections. Typically, threats like “I made this just for you” can be paired up with Ransomware and Spyware viruses which means that, by getting infected with the Trojan, you may automatically get compromised with the accompanying malware.
Therefore, one of the most important things is to prevent such infections by investing in reliable system protection. A good security program can prove invaluable in detecting the malware on time and is much more effective than relying on your personal observations to catch the virus because, in most cases, the Trojans don’t show any visible symptoms which can give them away. Besides, threats like “I made this just for you” may be quite challenging to remove if you are not armed up with a trusted removal tool or at least a detailed removal guide like the one below.