Remove Email Scam (Mac Guide) July 2019 Update

anti-malware offerOFFER *Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. SpyHunter's EULA, Privacy Policy, and more details about Free Remover. .com

There are signs suggesting that it is a scam. Apple would address users by their name rather than with a phrase “Dear Customer”.Apple will never ever send you an email stating your account has been lockedApple will never threaten to disable an account permanently, for any reason. .com2

While the website is legit, the actual url underlying that link in the email does not take you there. It takes you to: https: // / 8FHsrklP7G, which is definitely not an Apple website. .com1 is simply text pointing to a URL of a fake Apple ID management website used to steal account credentials.

The site is legitimate if you visit it manually, but links to it or other websites can easily be forged.That link doesn’t point to Apple’s servers; in addition, if an Apple ID is locked or disabled, the owner will be told when they try logging into it instead of through email.The site is legitimate if you visit it manually, but links to it or other websites can easily be forged.

If you want your computer to be safe and if you want to decrease the likelihood of encountering Ransomware cryptoviruses, Trojans and other similar dangerous threats, then you must make sure that your browser stays clean and that it doesn’t have any questionable components in it. This may actually sound rather simple and easy to achieve – simply do not add any sketch add-ons to the browser and everything should be fine, right? In theory, yes, in practice, things can be a bit different. What we mean by that is there are many, many software pieces out there that may not be inherently harmful but could still lead to certain security issues. Such are the infamous browser hijackers like “Apple Care”“Your Computer Is Locked”, “Apple Security Trojan Warning” with their ability to cause automatic ads generation and page-redirects, to alter the search engine service, the toolbar buttons and the homepage of popular browsers Google Chrome, Mozilla Firefox and Safari. Though these activities may not sound like much and though some users may not be all that disturbed by them, it’s important to know that the hackers on the Internet always seek to exploit even the slightest weakness in their victims’ systems. The presence of a hijacker in the main browser of the computer, for example, could be such a weakness in a way. The main problem here is the potential for the display of unsafe ads on your screen if a hijacker is present in the browser. Now, we need to point out that the hijacker apps themselves aren’t normally intended to cause harm – their goal is different and is mainly related to the generation of revenue through online advertising. Even so, the fact that there is a software component inside your browser which doesn’t really obey your commands and instead does only what its creators want it to is enough of a reason for you to want to have the offending application uninstalled.

Dealing with Scam

The article on this page has been written because of the recent reports about a software piece named Scam. According to what the users who have it in their machines say and also according to our own research, this app has most of the traits typical for a browser hijacker which is why it should be categorized as one. If you are among the many with Scam inside their browsers, you likely want to learn more about what methods you can use to remove this software. As we already mentioned, the presence of such an app in the system can be a potential security hazard due to the unknown sources of the ads and the page-redirects initiated by this software. You cannot know if a given advert isn’t actually linked to a site with Ransomware, Trojan Horse or Spyware infections in it. And, of course, there’s no need to mention that the sheer annoyance and obstructiveness of the ads and the changes in the browser is also a valid reason why most users would like to have Scam uninstalled. Therefore, without further ado, we will now give you our Scam removal guide:


Type  Browser Hijacker
Danger Level Medium (nowhere near threats like Ransomware, but still a security risk)
Symptoms Sudden redirects to obscure pages and changes in the browser’s homepage and/or search engine. 
Distribution Method The hijackers like Scam normally rely on software bundles to get distributed.
Detection Tool

anti-malware offerOFFER *Free Remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. SpyHunter's EULA, Privacy Policy, and more details about Free Remover.

Remove Email Scam 


The first thing you need to do is to Quit Safari (if it is opened). If you have trouble closing it normally, you may need to Force Quit Safari:

You can choose the Apple menu and click on Force Quit.

Alternatively you can simultaneously press (the Command key situated next to the space bar), Option (the key right next to it) and Escape (the key located at the upper left corner of your keyboard).

If you have done it right a dialog box titled Force Quit Applications will open up.

In this new dialog window select Safari, then press the Force Quit button, then confirm with Force Quit again.

Close the dialog box/window.



Start Activity Monitor by opening up Finder, then proceed to activity-monitor

Once there, look at all the processes: if you believe any of them are hijacking your results, or are part of the problem, highlight the process with your mouse, then click the “i” button at the top. This will open up the following box:


Now click on Sample at the bottom:


Do this for all processes you believe are part of the threat, and run any suspicious files in our online virus scanner, then delete the malicious files:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Drag and Drop File Here To Scan
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.


    The next step is to safely launch Safari again. Press and hold the Shift key while relaunching Safari. This will prevent Safari’s previously opened pages from loading again. Once Safari is opened up, you can release the Shift key.

    On the off chance that you are still having trouble with scripts interrupting the closing of unwanted pages in Safari, you may need to take some additional measures.

    First, Force Quit Safari again.

    Now if you are using a Wi-Fi connection turn it off by selecting Wi-Fi off in you Mac’s Menu. If you are using a cable internet (Ethernet connection), disconnect the Ethernet cable.


    Re-Launch Safari but don’t forget to press and hold the Shift button while doing it, so no previous pages can be opened up. Now, Click on Preferences in the Safari menu,

    Preferences in Safari

    and then again on the Extensions tab,

    extensions in safari

    Select and Uninstall any extensions that you don’t recognize by clicking on the Uninstall button. If you are not sure and don’t want to take any risks you can safely uninstall all extensions, none are required for normal system operation.

    The threat has likely infected all of your browsers. The instructions below need to be applied for all browsers you are using.

    Again select Preferences in the Safari Menu, but this time click on the Privacy tab,
    Privacy in Safari

    Now click on Remove All Website Data, confirm with Remove Now. Keep in mind that after you do this all stored website data will be deleted. You will need to sign-in again for all websites that require any form of authentication.

    Still in the Preferences menu, hit the General tab

    General Tab in Safari

    Check if your Homepage is the one you have selected, if not change it to whatever you prefer.
    Default Home Page

    Select the History menu this time, and click on Clear History. This way you will prevent accidentally opening a problematic web page again.

    firefox-512 How to Remove Scam From Firefox in OSX:

    Open Firefoxclick on mozilla menu (top right) ——-> Add-onsHit Extensions next.

    pic 6

    The problem should be lurking somewhere around here –  Remove it. Then Refresh Your Firefox Settings.

    chrome-logo-transparent-backgroundHow to Remove Scam From Chrome in OSX:

     Start Chrome, click chrome menu icon —–>More Tools —–> Extensions. There,  find the malware and  select  chrome-trash-icon.

    pic 8

     Click chrome menu icon again, and proceed to Settings —> Search, the fourth tab, select Manage Search Engines.  Delete everything but the search engines you normally use. After that Reset Your Chrome Settings.

    If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


    About the author


    Brandon Skies

    Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

    Leave a Comment