A text that looks like it came straight from a courthouse is making the rounds across the U.S. And yes, I got it too.Â
First things first, thatâs a scam. And to be clear: DONâT SCAN THAT QR CODE.Â
Itâs the same playbook as last yearâs toll road scams, just dressed up with a little more authority and a lot more pressure.Â
Before doing anything, our team ran it through McAfeeâs Scam Detector. It immediately flagged the message as suspicious, and thatâs exactly the kind of moment this tool is built for. When something feels just real enough to second guess, it gives you a clear signal before you click, scan, or spiral.Â
A screenshot showing Scam Detector in action.
How the scam worksÂ
The text claims youâve missed a payment, violated a law, or have some kind of outstanding âcase.â It then pushes you to scan a QR code or click a link to resolve it quickly.Â
From there, one of two things usually happens:Â
Youâre taken to a fake payment page designed to steal your money, orÂ
Youâre prompted to download something that gives scammers access to your device or data Â
Either way, the goal is the same: get you to act fast before you have time to question it.Â
Hereâs the scam text I got in California. Youâll notice it looks exactly like the others across the country.Â
The red flags in this messageÂ
Urgent, threatening language about fines, penalties, or legal action Â
Vague accusations with no real details about what you supposedly did Â
Official-looking formatting like case numbers, clerk signatures, and judge names Â
Copy-paste consistency across states: McAfee employees in New York and California received nearly identical messages with the same names Â
There are reports of this scam popping up nationwide, but the rule is simple: law enforcement does not text you to demand payment or resolve legal issues.Â
What to do if you scanned the QR codeÂ
First, donât panic. Then:Â
Do not pay anything or enter personal information Â
Do not delete apps you were told to install (this can make it harder to detect what happened) Â
Run a device scan using a trusted security tool like McAfeeâs free antivirus Â
Keep an eye on your financial accounts and logins for unusual activity Â
And that, my friends, is scam number one in this weekâs This Week in Scams (new format, weâre experimenting a little). Â
Letâs get into what else is on our radar.Â
What to Know About an Alleged Crunchyroll BreachÂ
Anime streaming platform Crunchyroll is investigating claims of a data breach involving customer support ticket data, potentially impacting millions of users.Â
According to TechCrunch, access appears to involve a third-party vendor system, a reminder that even strong security setups still rely on people and partners, which can introduce risk in everyday moments.Â
Even if youâve never entered your credit card into a support form, these tickets can still include:Â
Email addresses Â
Usernames Â
Screenshots or account details Â
Conversations that reveal habits, subscriptions, or personal context Â
Thatâs more than enough for scammers to build highly believable follow-ups.Â
Why this matters right nowÂ
When breaches like this surface, scammers donât wait. They use the moment to send emails and messages that feel timely, relevant, and legitimate.Â
For example, scammers might send messages pretending to be Crunchyroll and suggesting you âclick this link to secure your accountâ after the breach. In reality, that âsecurity checkâ exposes your information.
This is where tools like Scam Detector come back into play, flagging suspicious links and messages even when they reference real companies or real events.Â
What to do if you have a Crunchyroll accountÂ
Change your password, especially if youâve reused it elsewhere Â
Turn on two-factor authentication Â
Be cautious of emails referencing the breach or asking you to âsecure your accountâ Â
Avoid clicking links and go directly to the official site instead Â
How McAfee Helps You Stay Ahead of Scams and Breaches
McAfee+ Advanced gives you multiple layers working together so youâre not left figuring it out in the moment:Â
Scam Detector flags suspicious texts, emails, links, and even deepfake videos before you engage Â
Safe Browsing helps block risky sites if you do click or scan Â
Device Security helps detect and remove malicious apps or downloads Â
Identity Monitoring alerts you if your personal info shows up where it shouldnât, so you can act fast Â
Personal Data Cleanup helps remove your information from data broker sites, making you a harder target in the first place Â
Secure VPN keeps your data private, especially on public Wi-Fi Â
Plus our instant QR code scam checks will flag suspicious QR codes before you scan them.
Safety tips to carry into next weekÂ
Slow down when a message creates urgency. Thatâs the hook Â
Donât scan QR codes or click links from unexpected texts Â
Go directly to official websites instead of using links sent to you Â
Use tools that flag scams in real time so you donât have to guess Â
The reality is, these scams are designed to look normal. You shouldnât have to be an expert to spot them. Thatâs why McAfeeâs here to help.Â
Weâll be back next week with more scams making headlines.Â
Tax season is prime time for scammers. And in 2026, the scams are more convincing, more targeted, and increasingly powered by AI.Â
In this guide, we break down this yearâs biggest tax scams from the IRS Dirty Dozen and show how tools like McAfeeâs Scam Detector help flag malicious links, scan suspicious QR codes, and analyze risky messages across text, email, and social media to help you stay ahead of fraud.Â
67% are seeing the same or more scam messages than last year Â
40% say scams are more sophisticated Â
Only 29% feel very confident they can spot a deepfake scam Â
Nearly 1 in 4 Americans say theyâve lost money to a tax scam Â
Tax scams are not just increasing. They are getting harder to recognize in the moment.Â
What is the IRS Dirty Dozen?Â
The IRS Dirty Dozen is the agencyâs annual list of the most common and dangerous tax scams targeting individuals and businesses.Â
The 2026 list highlights a clear shift toward:Â
AI-driven impersonation Â
QR code and link-based phishing Â
Social media misinformation Â
Refund and credit manipulation schemes Â
These scams are designed to create urgency, confusion, and quick decisions. That combination is what makes them effective.Â
The IRS Dirty Dozen for 2026 and how to spot each scamÂ
Below is a full breakdown of all 12 scams identified by the IRS, along with what to look for and how protection tools can help.Â
#Â
Scam TypeÂ
How It WorksÂ
Red FlagsÂ
How McAfee HelpsÂ
1Â
IRS impersonation (email, text, DM)Â
Messages claim to be from the IRS asking you to verify info or claim a refundÂ
Urgent tone, links, QR codes, unexpected outreachÂ
Scam Detector flags suspicious messages and links across text, email, and social. Safe browsing blocks fake IRS sites if you click
2Â
AI voice scams and robocallsÂ
AI-generated calls mimic IRS agents or officialsÂ
Threats, payment pressure, spoofed caller IDÂ
Scam Detector helps validate follow-up messages or links tied to the call. Identity monitoring helps detect if your info is being used in impersonation attempts
3Â
Fake charitiesÂ
Scammers pose as charities to collect donations or dataÂ
Emotional appeals, vague organization detailsÂ
Scam Detector flags suspicious donation links. Safe browsing blocks fraudulent charity sites. Personal Data Cleanup reduces exposure to targeting lists
4Â
Social media tax misinformationÂ
Viral posts push fake deductions or âtax hacksâÂ
Promises of large refunds or loopholesÂ
Scam Detectorâs screenshot analysis lets you check social posts and DMs before acting, helping identify misleading or risky claims
5Â
IRS account takeover scamsÂ
Criminals use stolen data to access IRS accountsÂ
Alerts about account changes you didnât initiateÂ
Identity monitoring and alerts notify you if your data is exposed. Device security helps prevent malware used to steal credentials
6Â
Abusive capital gains schemes (Form 2439)Â
Fake or inflated claims tied to investment creditsÂ
Complicated filings tied to unfamiliar organizationsÂ
Scam Detector flags suspicious messages and links. Safe browsing blocks fraudulent filing sites tied to these schemes
7Â
Fake self-employment tax creditÂ
Misleading claims about eligibility for large creditsÂ
âYou qualifyâ messaging without verificationÂ
Safe browsing blocks scam sites attempting to capture personal or tax info
8Â
Ghost tax preparersÂ
Preparers refuse to sign returns or provide credentialsÂ
No PTIN, vague business identityÂ
Scam Detector helps assess suspicious messages or outreach. Identity monitoring adds protection if your data is shared with a bad actor
9Â
Non-cash donation schemesÂ
Inflated valuations used to reduce tax liabilityÂ
Unrealistic deductions, aggressive promotersÂ
Scam Detector flags suspicious offers and links. Safe browsing blocks sites attempting to collect sensitive financial data
10Â
Overstated withholding scamsÂ
False income or withholding reported to inflate refundsÂ
Encouragement to âboostâ refund numbersÂ
Scam Detector flags misleading content. Device security helps protect against malware tied to fake filing tools
Companies overpromise tax debt relief and charge high feesÂ
High-pressure sales tactics, guaranteed outcomesÂ
Scam Detector flags suspicious outreach. Personal Data Cleanup reduces targeting. Identity monitoring helps catch misuse of your data
How McAfee helps protect you from tax scamsÂ
Tax scams rarely rely on just one tactic. A message leads to a link. A link leads to a fake site. A fake site leads to stolen data or payment.Â
That is why protection needs to work across the full chain, not just one moment.Â
McAfee goes beyond traditional antivirus by combining multiple layers of digital protection into one app, helping you stay safer before, during, and after a scam attempt.Â
Here is how each layer helps:Â
Scam Detector helps flag suspicious messages, links, and AI-driven scams across text, email, and social media. It can also scan QR codes and analyze screenshots of messages that feel off. Â
Safe browsing tools help block risky websites, including fake IRS portals and lookalike domains designed to steal personal and financial information. Â
Secure VPN helps keep your connection private, especially on public Wi-Fi where sensitive activity like filing taxes or accessing financial accounts can be exposed. Â
Identity monitoring and alerts notify you if your personal information, like your Social Security number or email, appears in places it should not, helping you act quickly if identity theft is attempted. Â
Personal Data Cleanup helps reduce your exposure by removing your information from high-risk data broker sites that scammers use to target you. Â
Device and account security helps protect the devices and accounts you rely on every day, adding another layer of defense against malware, phishing, and unauthorized access. Â
Together, these protections help you do more than react to scams. They help you spot them earlier, avoid risky situations, and recover faster if something goes wrong.
Today marks the start of Spring in the Northern Hemisphere, and with warmer weather setting in summer trips are vacation planning are starting to take shape.  Â
But before you respond to that message about your hotel booking or payment confirmation, itâs worth asking: is it actually legit?Â
This week in scams, weâre breaking down a travel phishing scheme making the rounds through realistic booking messages, as well as new McAfee research on betting scams and AI-driven malware.Â
Scammers Who Know Your Exact Travel Reservation DetailsÂ
A new phishing campaign targeting travelers is exploiting hotel booking platforms like Booking.com, and itâs convincing enough to fool even cautious users.Â
According to reporting from ITBrew and Cybernews, attackers are running a multi-stage scam:Â
How The Booking Scam WorksÂ
Scam StageÂ
How It WorksÂ
What Youâll NoticeÂ
How to Protect YourselfÂ
Where McAfee HelpsÂ
Stage 1: Hotel account gets compromisedÂ
Attackers phish or hack hotel staff to access booking platforms and guest reservation data.Â
You wonât see this part â it happens behind the scenes.Â
Use strong, unique passwords and enable multi-factor authentication on your own accounts to reduce risk of similar breaches.Â
Identity Monitoring can alert you if your personal information appears in suspicious places or data leaks.Â
Stage 2: You receive a realistic messageÂ
Scammers use stolen booking data to send messages via WhatsApp, email, or even booking platforms.Â
The message includes your real name, hotel, and travel dates, making it feel legitimate.Â
Be cautious of unexpected outreach, even if the details are correct. Donât assume accuracy means authenticity.Â
Scam detection tools can help flag suspicious messages and identify potential phishing attempts.Â
Stage 3: Urgency is introducedÂ
The message claims thereâs an issue with your reservation and pushes you to act quickly.Â
Phrases like âconfirm within 12 hoursâ or ârisk cancellationâ create pressure.Â
Pause before acting. Legitimate companies rarely require urgent payment changes without prior notice.Â
Scam detection can help identify high-risk messages designed to pressure you into quick decisions.Â
Stage 4: Youâre sent to a fake payment pageÂ
A link leads to a convincing lookalike site designed to steal your payment details.Â
The page looks real but may have subtle URL differences or unusual formatting.Â
Always navigate directly to the official website or app instead of clicking links in messages.Â
Safe Browsing tools can help block risky or known malicious websites before you enter sensitive information.Â
March Madness Brackets, Bets, and Bad ActorsÂ
March Madness brings brackets, bets, and a flood of bad actors.Â
New McAfee research found that 1 in 3 Americans (32%) say theyâve experienced a betting or gambling scam, and nearly a quarter (24%) say theyâve lost money to one. On average, victims reported losing $547.Â
Thatâs not surprising when you look at the environment around the tournament. More than half of Americans are watching, more than half are participating in some form of betting, and 82% say theyâve seen betting promotions in the past year.Â
Some of the most common setups this season include:Â
âGuaranteed winâ or âcanât loseâ betting tips that require payment upfrontÂ
Fake sportsbook promotions offering bonus bets or free creditsÂ
Messages claiming you have winnings, but need to pay a fee to unlock themÂ
Impersonation scams posing as sportsbook support or betting platformsÂ
Invitations to private âVIP betting groupsâ on WhatsApp or TelegramÂ
The takeaway: If a betting offer promises guaranteed results, demands the use of bizarre apps and sites, asks for money upfront, or pushes you to act quickly, itâs not an edge. Itâs a scam.Â
âAI-Writtenâ Malware Is Hiding in Everyday DownloadsÂ
Not all scams start with a message. Some start with a search.Â
443 malicious ZIP files disguised as legitimate softwareÂ
1,700+ file names used to make those downloads look credibleÂ
48 variants of a malicious DLL file used to infect devicesÂ
These werenât hosted on obscure corners of the internet either. The files were distributed through platforms people recognize, including Discord, SourceForge, and file-sharing sites.Â
Hereâs how the attack typically works:Â
You search for a tool.Â
You download what looks like the right file.Â
It opens normally at first.Â
Then, behind the scenes, malware loads quietly and begins pulling in additional code. In some cases, victims are shown fake error messages while the real infection happens in the background.Â
From there, attackers can:Â
Turn your device into a cryptocurrency mining machineÂ
Install additional malware like infostealers or remote access toolsÂ
Slow down your system while running hidden processesÂ
What makes this campaign stand out is that some of the code appears to have been generated with help from AI tools.Â
That doesnât mean AI is running the attack on its own. But it does suggest attackers are using AI to:Â
Generate code fasterÂ
Create more variations of malwareÂ
Scale campaigns more efficientlyÂ
In other words, the barrier to building malware is getting lower.Â
The takeaway: If a download is unofficial, hard to find, or feels like a shortcut, itâs worth slowing down. The file may look right, but that doesnât mean itâs safe.Â
How McAfee+ Advanced Works in These Scam MomentsÂ
Whether itâs a message about your booking, a betting offer that looks legitimate, or a download that appears to be exactly what you were searching for, these scams all rely on the same thing: they blend into everyday moments.Â
Thatâs where having backup like McAfee+ Advanced comes in. It includes:Â
McAfeeâs Scam Detector, which helps flag suspicious links in texts and messages like the ones used in these booking and betting scams, so you can spot something risky before you engage
Web protection and real-time device security, helping protect against risky links, malicious sites, and evolving threats if you do click, including fake betting platforms or malware hidden in downloads
Personal Data Cleanup, which helps remove your information from sites that sell it, making it harder for scammers to access the personal details that make messages and scams feel legitimate
Secure VPN, which helps keep your personal info safe and private anywhere you use public Wi-Fi, like hotels, airports, and cafĂŠs while traveling
Identity Monitoring and alerts, with 24/7 scans of the dark web to help ensure your personal and financial information isnât being exposed or reused
Credit and transaction monitoring, so you can get alerts about suspicious financial activity if your information is ever compromisedÂ
Identity restoration support and up to $2 million in identity theft coverage, giving you access to US-based experts and added peace of mind if something does go wrongÂ
Stay skeptical, verify before you click, and weâll see you next week with more.Â
Filing your taxes may not feel risky. You download a W-2. Upload a PDF. Email a document. Move on.Â
But tax season is one of the most active times of year for scammers, and the moment you start collecting and sharing tax documents is often when people are most exposed.Â
W-2s, 1099s, prior-year returns, and identity documents contain nearly everything criminals need to commit tax fraud or identity theft. And increasingly, scammers donât need to break into systems to get them. They rely on rushed filers, familiar workflows, and convincing messages that blend into tax season noise.Â
The good news: securing your tax documents doesnât require expensive tools or technical expertise. With a few deliberate steps, you can dramatically reduce your risk before anything leaves your device.Â
Why Scammers Want Your Tax Documents
Tax documents are valuable because theyâre complete.A single W-2 includes your full name, Social Security number, employer information, and income data. Combined with other files, like a prior return or ID scan, thatâs enough to:Â
File a fraudulent tax returnÂ
Open new credit accountsÂ
Access financial servicesÂ
Sell your identity on criminal marketplacesÂ
Thatâs why tax-related phishing and document theft spike every filing season. Many scams donât look like scams at all. They look like routine requests, delivery notices, or âquick questionsâ from someone you already trust.Â
How to Safely Handle and Share Tax DocumentsÂ
Tax forms contain some of the most sensitive personal information you have. Taking a few precautions when storing and sharing them can reduce the risk of identity theft and tax fraud.Â
Store Your Tax Documents SecurelyÂ
Before sending anything to an accountant or tax service, make sure your files are organized and stored safely.Â
Use a single secure folder Create one folder, on your device or in a trusted private cloud service account, specifically for tax documents. Avoid scattering files across downloads, email attachments, and screenshots.Â
Rename files clearly Use descriptive names such as â2025_W2_EmployerName.pdfâ so you can easily identify documents without opening multiple files or re-downloading forms.Â
Avoid public Wi-Fi If youâre downloading tax documents, do it on a secure home network whenever possible. Public Wi-Fi can increase the risk of interception. If you must connect in public, using a trusted VPN adds another layer of protection.Â
Watch for Tax-Season Phishing ScamsÂ
Many tax scams donât target software, they target people.Â
Common examples include:Â
Emails pretending to be from the IRS asking you to âverifyâ informationÂ
Messages that appear to come from your employer requesting a copy of your  W2Â
Fake tax portals asking you to re-upload documentsÂ
Urgent messages claiming there is a problem with your returnÂ
These scams often arrive when youâre already expecting tax-related communication, which makes them easier to trust.Â
Important: The IRS does not initiate contact by email, text message, or social media to request personal or financial information.Â
Use Secure Ways to Share Tax DocumentsÂ
Email attachments are convenient, but they can also expose sensitive information.Â
Safer options include:Â
A secure client portal provided by your accountant or tax preparerÂ
Encrypted file-sharing servicesÂ
Password-protected documents sent through a secure channelÂ
If you must email a document, avoid sending the password in the same message.Â
Verify Requests Before Sending DocumentsÂ
Even if a request looks legitimate, pause before sharing sensitive files.Â
Ask yourself:Â
Did I expect this request?Â
Is the sender using their normal contact method?Â
Does the message create urgency or pressure?Â
If something seems unusual, verify the request through a separate channel, such as calling the person directly or starting a new email thread.Â
Secure the Devices You Use to FileÂ
Protecting tax documents also means protecting the device where theyâre stored.Â
Before filing your taxes:Â
Install the latest software updates on your computer and phoneÂ
Tax scams increasingly arrive through text messages and social media, not just email, so protection needs to cover the places scammers actually reach you.Â
File Early and Watch for Warning SignsÂ
Filing early reduces the opportunity for scammers to file a fraudulent tax return in your name.Â
After filing:Â
Watch for IRS notices you didnât expectÂ
Monitor financial accounts for unfamiliar activityÂ
Be cautious of follow-up messages claiming problems with your returnÂ
If something feels off, investigate before responding.Â
Step-by-Step: How to Encrypt Tax Documents Before Sending ThemÂ
StepÂ
What to DoÂ
Why It MattersÂ
1. Put all tax files into one folderÂ
Gather your W-2s, 1099s, receipts, PDFs, and spreadsheets in one folder.Â
Keeps you organized and prevents accidentally leaving something unprotected.Â
2. Convert photos into PDFs (if needed)Â
If documents are photos, save them as a PDF using your phone scanner app or printer settings.Â
PDFs are easier to encrypt and share securely than image files.Â
3. Combine files into one ZIP folderÂ
On your computer, select all files â right click â Compress / Zip.Â
Creates a single package you can protect with a password.Â
4. Add a password to the ZIP fileÂ
Choose the âEncryptâ or âPassword Protectâ option when creating the ZIP file.Â
Password protection helps prevent unauthorized access if the file is intercepted.Â
5. Use a strong passwordÂ
Use at least 12 characters with a mix of letters, numbers, and symbols.Â
Weak passwords can be cracked quickly.Â
6. Rename the file to something genericÂ
Use a name like âDocuments_2025.zipâ instead of âTaxes_W2_SSN.zip.âÂ
Avoids exposing sensitive info in the file name itself.Â
7. Send the encrypted file through a secure methodÂ
Upload via your tax preparerâs secure portal or share through a secure cloud link.Â
Email attachments can be risky if the wrong person gains access.Â
8. Send the password separatelyÂ
Text or call the passwordâdonât include it in the same email as the file.Â
If someone intercepts the email, they wonât have both pieces.Â
Acting quickly can limit damage and help prevent long-term fallout.Â
Final Thoughts
Securing your tax documents doesnât require perfection, just intention.Â
By slowing down, using safer sharing methods, and staying alert to tax-season scams, you can protect yourself before problems start. In a season where everyone feels rushed, a few extra minutes can save months of cleanup later.Â
McAfee helps protect your identity, devices, and personal information so tax season doesnât become scam season.Â
Frequently Asked QuestionsÂ
Q:Â Is it safe to email tax documents to my accountant?Â
A: Email is not the safest option. Secure portals or encrypted file-sharing tools are preferred for sensitive documents like W-2s and tax returns.Â
Q: How do W-2 phishing scams work?Â
A: Scammers impersonate employers or tax authorities to trick people into sending W-2s or personal information, often using urgent or official-looking messagÂ
Q: Can scammers file taxes using my W-2?Â
A:Â Yes. With enough personal information, criminals can file fraudulent returns or commit identity theft.Â
Q:Â How can I tell if a tax message is fake? A:Â Be cautious of unsolicited requests, urgent language, unfamiliar links, or requests for documents outside normal filing workflows.Â
Q: Whatâs the safest way to share tax documents online?Â
A:Â Use secure portals, encrypted file-sharing, and verified communication channels. Avoid public Wi-Fi and unprotected email attachments.Â
McAfee Labs has uncovered a widespread malware campaign hiding inside fake downloads for things like game mods, AI tools, drivers, and trading utilities.Â
What makes this campaign especially notable is that some parts of it appear to have been built with help from large language models (LLMs). McAfee researchers found signs that certain scripts likely used AI-generated code, which may have helped the attackers create and scale the campaign faster.Â
That does not mean AI created the whole operation on its own. But it does suggest AI may be helping cybercriminals lower the effort needed to build malware and launch attacks.Â
Attackers created many different fake downloads to reach more victimsÂ
48 malicious DLL variantsÂ
The campaign used multiple versions of the malware, not just one fileÂ
1,700+ file names observedÂ
The same threat was repackaged under many different names to look convincingÂ
17 distinct kill chainsÂ
Researchers found multiple attack flows, but they followed a similar overall patternÂ
Hosted on familiar platformsÂ
The malware was distributed through services users may recognize, including Discord and SourceForgeÂ
AI-assisted code suspectedÂ
Some scripts contained explanatory comments and patterns that strongly suggest LLM assistanceÂ
Cryptomining and additional malware observedÂ
Infected devices could be used to mine cryptocurrency or receive more malicious payloadsÂ
What Is âAI-Written Malwareâ?Â
In this case, âAI-written malwareâ does not mean an AI system independently invented and launched the attack.Â
Instead, McAfee Labs found evidence that the attackers very likely used AI tools to help generate some of the code used in the campaign, especially in certain PowerShell scripts.Â
Put simply:Â
TermÂ
Plain-English meaningÂ
Large language model (LLM)Â
An AI system that can generate text and code based on promptsÂ
AI-assisted malwareÂ
Malware where attackers appear to have used AI tools to help write or structure parts of the codeÂ
Vibe codingÂ
A style of coding where someone describes what they want and an AI does much of the writingÂ
This matters because it can make malware development faster, easier, and more scalable for attackers.Â
Figure 1: Attack Vector
Â
How The Fake Download Attack WorksÂ
The attack begins when someone searches for software online and downloads what looks like the tool they wanted.Â
That tool might appear to be a game mod, AI voice changer, emulator, trading utility, VPN, or driver. But behind the scenes, the ZIP archive includes malicious components that start the infection.Â
StepÂ
What happensÂ
1. A user downloads a fake fileÂ
The ZIP archive is disguised as something useful or desirable, such as a mod menu, AI tool, or driverÂ
2. The file appears normal at firstÂ
In some cases, the package includes a legitimate executable so it feels more convincingÂ
3. A malicious DLL is loadedÂ
A hidden malicious file, often WinUpdateHelper.dll, starts the real attackÂ
4. The user is distractedÂ
The malware may display a fake âmissing dependencyâ message and redirect the user to install unrelated softwareÂ
5. A PowerShell script is pulled from a remote serverÂ
While the user is distracted, the malware contacts a command-and-control server and runs additional codeÂ
6. More malware is installedÂ
Depending on the sample, the device may receive coin miners, infostealers, or remote access toolsÂ
7. The infected device is abused for profitÂ
In many cases, attackers use the victimâs system resources to mine cryptocurrency in the backgroundÂ
What Kinds of Files Were Used as BaitÂ
McAfee found that the attackers cast a very wide net. The malicious ZIP files impersonated many types of software, including:Â
Bait categoryÂ
ExamplesÂ
Gaming toolsÂ
game mods, cheats, executors, Roblox-related toolsÂ
AI-themed toolsÂ
AI image generators, AI voice changers, AI-branded downloadsÂ
System utilitiesÂ
graphics drivers, USB drivers, emulators, VPNsÂ
Trading or finance toolsÂ
stock-market utilities and related downloadsÂ
Fake security or malware toolsÂ
fake stealers, decryptors, and other risky-looking utilitiesÂ
That broad range is part of what made the campaign effective. It was designed to catch people already looking for shortcuts, unofficial tools, or hard-to-find software.Â
Why McAfee Researchers Believe AI Was UsedÂ
One of the strongest clues came from the comments inside some of the attack scripts.Â
McAfee researchers found explanatory comments that looked more like AI-generated instructions than the kind of shorthand attackers usually leave for themselves. In one example, a comment referred to downloading a file from âyour GitHub URL,â which suggests the code may have come from a generated template and was not fully cleaned up before use.Â
These details do not prove every part of the campaign was AI-made. But they do support McAfeeâs assessment that certain components were likely generated with help from large language models.Â
What Happens on an Infected DeviceÂ
In many cases, the malware was used to turn victimsâ computers into quiet crypto-mining machines.Â
McAfee observed mining activity involving several cryptocurrencies, including:Â
RavencoinÂ
ZephyrÂ
MoneroÂ
Bitcoin GoldÂ
ErgoÂ
CloreÂ
Some samples also downloaded additional payloads such as SalatStealer or Mesh Agent.Â
For victims, that can mean:Â
Possible effectÂ
What it may look likeÂ
Slower performanceÂ
apps lag, games stutter, system feels unusually sluggishÂ
High CPU or GPU usageÂ
fans run constantly, laptop gets hot, battery drains fasterÂ
if an infostealer or remote access tool is installedÂ
McAfee was also able to trace several Bitcoin wallets tied to the campaign. At the time of the report, those wallets held about $4,536 in Bitcoin, while total funds received were approximately $11,497.70. Researchers note the real total could be higher because some of the currencies involved are harder to trace.Â
Who Was Targeted MostÂ
This campaign was observed most heavily in:Â
United StatesÂ
United KingdomÂ
IndiaÂ
BrazilÂ
FranceÂ
CanadaÂ
AustraliaÂ
That does not mean users elsewhere were unaffected. These were simply the countries where researchers saw the highest prevalence.Â
Figure 2: Geographical PrevalenceâŻ
  Red Flags To Watch ForÂ
Even though the campaign used advanced techniques, the warning signs for users were often familiar.Â
Red flagÂ
Why it mattersÂ
You found the file through a random linkÂ
Unofficial forums, Discord links, and file-hosting pages are common malware delivery pathsÂ
The download is a ZIP for something sketchy or unofficialÂ
Cheats, cracks, mod tools, and unofficial utilities carry higher riskÂ
You get a âmissing dependencyâ messageÂ
Attackers may use this to push a second download while the real infection happens in the backgroundÂ
The file name looks right, but the source feels wrongÂ
Familiar names can be faked easilyÂ
Your PC suddenly slows down or overheatsÂ
Hidden cryptominers often abuse system resourcesÂ
You notice new, unrelated software installedÂ
The campaign sometimes used unwanted software installs as a distractionÂ
How To Stay Safe From Malware Hidden in Fake DownloadsÂ
This campaign is a reminder that not every convincing file is a safe one. A few habits can reduce your risk significantly.Â
Safety stepÂ
Why it helpsÂ
Download software only from official sourcesÂ
This lowers the chance of accidentally installing a trojanized fileÂ
Avoid cheats, cracks, and unofficial modsÂ
These categories are common bait for malware campaignsÂ
Be skeptical of dependency promptsÂ
Unexpected requests to install helper files or missing components can be part of the attackÂ
Keep your security software updatedÂ
Current protection can help detect known threats and suspicious behaviorÂ
Pay attention to system performanceÂ
A suddenly hot, loud, or slow PC may be a sign something is running in the backgroundÂ
Review what you download before opening itÂ
Even a familiar file name does not guarantee a file is legitimateÂ
McAfee helps protect against malware threats like these with multiple layers of security, including malware detection and safer browsing protections designed to help stop risky downloads before they can do damage.Â
What To Do If You Think You Opened One of These FilesÂ
If you think you downloaded and ran a suspicious file like one described in this campaign:Â
ActionÂ
Why it mattersÂ
Disconnect from the internetÂ
This can help interrupt communication with attacker-controlled serversÂ
Run a full security scanÂ
A trusted scan can help identify malicious files and behaviorÂ
Delete suspicious downloadsÂ
Remove the file and avoid reopening itÂ
Check for unfamiliar software or startup itemsÂ
The infection may have installed additional componentsÂ
Change important passwords from a clean deviceÂ
This is especially important if data-stealing malware may have been involvedÂ
Monitor accounts for unusual activityÂ
Keep an eye on email, banking, and other sensitive accountsÂ
If your computer continues acting strangely after a scan, it may be worth getting professional help.Â
What This Means for the Future of MalwareÂ
This campaign highlights how cybercrime is evolving.Â
The core risk is not just fake downloads. It is the fact that attackers are using AI tools to help generate code, create variations, and speed up parts of the malware development process.Â
That can make campaigns like this easier to scale and harder to ignore.Â
For everyday users, the takeaway is simple: if a file seems unofficial, rushed, or too good to be true, pause before opening it. A fake download may look like a shortcut, but it can quietly turn your device into a target. Â
Frequently Asked QuestionsÂ
FAQsÂ
Q:Â What is AI-written malware?
A: AI-written malware generally refers to malicious code, or parts of a malware campaign, that appear to have been created with help from AI coding tools or large language models.Â
Q:Â Did AI create this entire malware campaign?Â
A: McAfee Labs did not say that. The research suggests that certain components, especially some scripts, were likely generated with help from large language models.Â
Q:Â What was this malware disguised as?Â
A:Â The malicious files impersonated game mods, AI tools, drivers, trading utilities, VPNs, emulators, and other software downloads.Â
Q:Â What can happen if you open one of these fake files?Â
A: Depending on the sample, the malware may install coin miners, steal data, establish persistence, or download additional malicious tools.Â
Q:Â Can malware really use my computer to mine cryptocurrency?Â
A: Yes. McAfee observed samples in this campaign that used victimsâ CPU and GPU resources to mine cryptocurrency in the background.Â
Q:Â What is the safest way to avoid this kind of malware?Â
A:Â Download software only from official or trusted sources, avoid unofficial tools and cheats, be cautious of fake dependency prompts, and keep your security protection up to date.Â
The term âVibe coding,â first coined back in February of 2025 by OpenAI researchers, has exploded across digital platforms. With hundreds of articles and YouTube Videos discussing the dangers of Vibe coding and warning the internet about the rise of âVibe Codersâ, while others labelled it as the fundamental shift in software development and the future of coding. Â
Vibe Coding is an approach where the AI does heavy lifting, rather than the user. Instead of manually writing code or implementing algorithms, users describe their intent through text-based prompt, and the LLMs respond with fully functional code and explanation. Unsurprisingly, the internet is now flooded with guides on the best LLMs and prompts to generate âperfectâ code.Â
Given the ease of generating fully functional code, McAfee Labs has also seen a rise in vibe-coded malware. In these campaigns, certain components of the kill chain contain AI-generated code, significantly reducing the effort and knowledge required to execute new malware campaigns. This shift not only makes malware campaigns more scalable but also lowers the barrier to entry for new malware authors.Â
Executive summaryÂ
In January 2026, McAfee Labs observed 443 malicious zip files impersonating a wide range of software, including AI image generators and voice-changing tools, stock-market trading utilities, game mods and modding tools, game hacks, graphics card and USB drivers, ransomware decryptors, VPNs, emulators, and even infostealer, cookie-stealer, and backdoor malware, to infect users. Â
Across the 440+ zip files, we observed 48 unique malicious WinUpdateHelper.dll variants, responsible for the infections. McAfee has been detecting variants of this threat since December 2024, although the vibe coding observed in certain components appears to be a recent addition. These files are distributed through various legitimate content delivery network (CDN) services and file-hosting websites, such as Discord, SourceForge, FOSSHub, and MediaFire, to name a few. Another website that was actively delivering this malware was mydofiles[.]com.Â
Here, the attackers implement volume-driven malware distribution techniques to infect as many users as possible. Â
Figure 1: Attack Vector
This attack begins when users surf the internet looking for tools and software that promise to simplify their tasks. Instead, they encounter trojanized zip files. Â
We discovered over 100 URLs actively spreading this malware, of which approximately 61 were hosted on Discord, 17 on SourceForge, and 15 on mydofiles[.]com.Â
On running the executable, it loads a malicious WinUpdateHelper.dll file, which redirects the user to file-hosting websites, under the disguise that they are missing crucial dependencies and tricks them into installing unrelated software, which is a distraction. Meanwhile, the DLL has already requested and executed a malicious PowerShell script from a command-and-control (C2) server. Â
This script infects the userâs system and downloads additional mining software, and abuses the systemâs resources, or it downloads additional payloads such as SalatStealer or Mesh Agent, depending on the WinUpdateHelper.dll sample which infected the user. Â
In this PowerShell script, the presence of explanatory comments and structured sections strongly indicates the use of LLM models to generate this code.Â
Read more about this in the Using AI to generate malware? section below. Â
So far, weâve observed the mining of Ravencoin, Zephyr, Monero, Bitcoin Gold, Ergo, and Clore cryptocurrencies.   Â
Due to the presence of hardcoded Bitcoin wallet credentials within these malware samples, we were able to trace on-chain transactions and identify wallets containing over $4,500 USD that are part of this campaign. Â
Since most of the mining activity targets privacy-focused cryptocurrencies such as Zephyr, Ravencoin and Monero, the real financial impact is likely to be nearly double the amount identified through Bitcoin tracing alone. Â
Geographical PrevalenceÂ
Figure 2: Geographical PrevalenceâŻÂ
This malware campaign has specifically targeted users in the following counties, ranked by prevalence: The United States of America, followed by United Kingdom, India, Brazil, France, Canada, Australia.Â
Bottom Line
The availability of LLMs capable of generating code instantly, combined with the widespread accessibility of technical knowledge, has created a low-effort, high-reward environment, making malware deployment increasingly accessible.Â
At McAfee Labs, we have been doing hard work so that you donât need to worry. But it always helps to be informed and educated on the latest threat that steps into the threat landscape. We will continue monitoring these campaigns to ensure our customers remain informed and protected across platforms.Â
Technical AnalysisâŻÂ
Impersonated Applications
Here we see malware distribution at a large scale and by analyzing the filenames of these ZIP archives, we can infer to the users that are being targeted. These are some of the names weâve witnessed in the wild.Â
Figure 3: Malware Impersonating gaming software
The attackers are actively impersonating video game cheats and game mods for popular titles, and well-known script executors for Roblox, such as Delta Executor and Solara as seen above. Â
Names such as Panther-Stealer and Zerotrace-Stealer indicate that even users looking for malware on the internet are not safe either, reinforcing the notion that there is truly no honor among thieves.Â
The campaign also leverages drivers and AI-themed tools as part of its lure portfolio among other tools. Interestingly, we see the name âDeepSeek.zipâ, where attackers are exploiting a prominent LLM model, DeepSeek. McAfee had encountered these types of attacks in early 2025 and covered them extensively. Â
Once the user downloads the ZIP archive from Discord or any other website. They get the following set of files.
Figure 5: Files within the zip archive.
Here, the executable named âgta-5-online-mod-menu.exeâ (Highlighted in Blue) is a legitimate and clean file. Whereas the file named âWinUpdateHelper.dllâ (Highlighted in Red) is malicious. Â
Figure 6: Command Prompt misinforming the user
On executing âgta-5-online-mod-menu.exeâ, the malicious DLL is loaded. The user is informed that they are missing dependencies, and theyâre redirected to the following URL via default browser. Â
Here, within the URL, a tracker variable is used to identify which malware has infected the user. In this instance, it was âgta-5-online-mod-menuâ. Â
Figure 7: Website prompting users to download dependencycore.zip
Dependecycore.zip is a setup file. On execution, it installs unrelated 3rd party software on the victimâs system.Â
Figure 8: Files dropped by Dependecycore.zip in temp folder
In this instance, iTop Easy Desktop was installed.Â
This unwanted installation is meant to subvert usersâ attention. As, the WinUpdateHelper.dll has already connected to the C2 server and infected the system.  Â
Stage 1 Payload â Malicious Functionality Â
Once the redirection code is executed, the malware executes the malicious code. Â
In the above code snippet, which is present in the WinUpdateHelper.dll, we can see that a new service has been created under the name âMicrosoft Console Hostâ to make it appear to be benign (Highlighted in Red). The parameters passed to this service ensure that it executes at system boot. This is done to maintain persistence in the system.
The service executes a PowerShell command that dynamically generates the C2 domain using the UNIX time stamp. Â
Using the following code, $([Math]::Floor([DateTimeOffset]::UtcNow.ToUnixTimeSeconds() / 5000000) * 5000000).xyzÂ
It generates a domain name that changes once every 5,000,000 seconds or 58 days.Â
The latest C2 domain weâve discovered that is up and running is 1770000000[.]xyz/script?id=fA9zQk2L0M&tag=WinUpdateHelper
During our analysis we observed the following domain 1765000000[.]xyz/script?id=fA9zQk2L0M&tag=WinUpdateHelper, which is present in the following images. Â
Here the id=fA9zQk2L0M is randomly generated, to uniquely identify the user and tag=WinUpdateHelper is used to identify the malware campaign. Â
The malware connects to the above-mentioned C2 server to download a PowerShell script and execute it in memory. This fileless execution ensures improved evasion against signature-based detections.Â
Stage 2 Payload â PowerShell Script Â
Figure 10: PowerShell downloaded from the C2 server
It is funny to note here, that the first comment of this script says â# I am forever sorryâ which indicates that the attacks do carry some guilt regarding their actions, but not enough to stop the campaign. We found similar comments, such as â# sorry lolâ, across multiple PowerShell scripts we discovered. Â
The first set of commands (Highlighted in Green) are used to delete windows services and scheduled tasks. This is done to remove older or conflicting persistence mechanisms and to avoid duplicate miners from running on the same system.Â
The second set of commands (Highlighted in Red) are registry modifications, that adds âC:\ProgramDataâ to Windows Defender exclusion paths. That is, ProgramData Folder wonât be scanned by Windows Defender anymore. This exclusion allows malware to drop additional payloads to disk, without the risk of them being detected and removed. Â
The third set of commands (Highlighted in Blue) does exactly that. It downloads the next level payload from the URL âhxxps://1765000000[.]xyz/download/xbhgjahddaaâ and stored it at this path âC:\ProgramData\fontdrvhost.exeâ.
Again the name âfontdrvhost.exeâ imitates a legitimate Windows binary, to masquerade its true intent. After the download, the file is decoded using a simple arithmetic decryption routine. This provides protection against static signature detection and network detection.Â
The payload is an XMRIG miner sample. In the next command, the miner is initialized and executed. Here, we see the miner connecting to âsolo-zeph.2miners.com:4444â and start CPU based Zephyr coin mining using the following wallet address: âZEPHsCY4zbcHGgz2U8PvkEjkWjopuPurPNv8nnSFnM5MN8hBas8kBN4hoNKmc7uMRfUQh4Fc9AHyGxL6NFARnc217m2vYgbKxfâ.Â
Figure 11: PowerShell downloaded from the C2 server continued
In the second half of the script, we see another miner being set up and executed using the same technique (Highlighted in Red). This time the file is stored as âRuntimeBroker.exeâ in the ProgramData folder. The miner is connecting to âsolo-rvn.2miners.com:7070â to mine Ravencoin and it is using the systemâs GPU instead of the CPU for mining (Highlighted in Blue). Â
This is the wallet address used for mining in this instance âbc1q9a59scnfwkdlm6wlcu5w76zm2uesjrqdy4fr8râ. Â
Hence, we see a dual coin-mining deployment infrastructure utilizing both CPU and GPU resources to optimize mining efficiency.Â
Bitcoin? InterestingâŚÂ Â
What is interesting here is that attackers have used a bitcoin wallet address for mining Ravencoin, which indicates they are using multi-coin pools for mining. The attackers are using the victimsâ machine to mine Ravencoin and automatically convert the mining rewards to Bitcoin before the payout. Â
This is done for a variety of reasons, such as, bitcoin offers higher liquidity and has broader acceptance, but most importantly, Ravencoin is computationally easier and economically viable to mine on victimâs system. Bitcoin requires specialized ASIC hardware for profitable mining and attempting to mine Bitcoin directly on infected systems would generate negligible returns. Weâve seen the same behaviour in multiple samples.Â
This is a smoking gun. Unlike Zephyr coin or Monero, Bitcoinâs blockchain is fully traceable. Every Satoshi, the smallest unit of Bitcoin, can be traced across the blockchain from the moment it was mined to its current holder. From there, it becomes easy to determine how much cryptocurrency the threat actor is receiving. More on this later. Â
Anti-Analysis TechniquesÂ
The attackers have meticulously designed the campaign and have implemented various anti-analysis techniques to thwart researchers. Â
The PowerShell script weâve seen above is responsible for downloading and initializing the coin miner samples. It is only accessible via PowerShell. If we try to access the server via Curl, we get the following response. Â
Figure 12:Â 301 Response from the server
 This indicates that the server is actively monitoring the User-Agent of incoming requests and deploys the payload only when the request originates from PowerShell.Â
 Similarly, the URLs embedded within the PowerShell script that download the next payload are unique to each victim and remain active for 60 seconds. After that, they return a 404 Not Found error. Â
Figure 13: URLs within the PowerShell
These techniques are meant to confuse and disorient researchers, making the analysis difficult. Â
Using AI to generate malware? Â
While working on this malware campaign, we came across over 440 unique zip files. These same zip files were distributed with over 1700 different names, targeting various software.Â
Across these 440 zip files, we noticed 48 unique variants of WinUpdateHelper.dll. These 48 files can be clustered together into 17 distinct kill chains, each featuring their own C2 infrastructure, misleading installation setups, second-stage PowerShell scripts and final payloads, yet the cryptocurrency wallet credentials remain similar.Â
In the above technical analysis, weâve only covered 1 kill chain. Yet, across these 17 kill chains, weâve noticed the flow remain the same. Â
Figure 14:Â PowerShell Script with LLM-Generated Comments
Across multiple second stage payloads, we encounter multiple comments such as the following, embedded within the code:
# === Create and execute run.bat in C:\ProgramData ===
::Â This batch file:
:: â Creates the hidden folder C:\ProgramData\cvtres if it doesnât exist (using CMD attrib for hidden + system)
::Â â Downloads cvtres.exe from your GitHub URL
::Â â Saves it to C:\ProgramData\cvtres\cvtres.exe
:: â Executes it immediately
::Â â Runs completely hidden/minimized (no window visible)
The presence of such explanatory-style comments indicates that large language models were likely used during the development of these scripts. Especially, the comment âDownloads cvtres.exe from your GitHub URLâ, where âYour GitHub URLâ refers to the threat actorâs GitHub repository that is hosting the malware, which indicates potential vibe coding. Â
Tracking Bitcoin Across the BlockchainÂ
During analysis of this malware campaign, we came across few instances where the final payload was Infostealer malware. In most cases it was coin miner samples. In these cases, we encountered wallet credentials and mining pool URLs for several alternative cryptocurrencies such as Ravencoin, Zephyr, Monero, which arenât traceable. Â
Fortunately, we came across 7 bitcoin wallets that are part of this malware campaign and are actively receiving mined cryptocurrency.Â
bc1q9a59scnfwkdlm6wlcu5w76zm2uesjrqdy4fr8r    bc1q7cpwxjatrtpa29u85tayvggs67f6fxwyggm8kdÂ
bc1qyy0cv8snz7zqummg0yucdfzpxv2a5syu7xzsdq   bc1qxhp6mn0h7k9r89w8amalqjn38t4j5yaa7t89rpÂ
bc1qxnkkpnuhydckmpx8fmkp73e38dfed93uhfh68l   bc1qrtztxnqnjk9q4d5hupnla245c7620ncj3tzp7hÂ
bc1q97yd574m9znar99fa0u799rvm55tnjzkw9l33wÂ
As of writing this blog, these wallets contain Bitcoin valued at approximately $4,536.20 USD.Â
Figure 15: Wallet Snapshot displaying the total value Â
These wallets have seen regular withdrawals, with total funds received amounting to approximately $11,497.7 USD.Â
McAfee CoverageâŻ
McAfee has extensive coverage for this Coinminer Malware Campaign. Weâre proactively covering new samples observed in the wild.Â
Trojan:Win/Phishing.APÂ
Trojan:Script/Coinminer.ATÂ
Trojan:Win/Dropper.ATÂ
Indicator of Compromise(s)
File TypeÂ
SHA256/URLsÂ
File NameÂ
SHA256Â
94de957259c8e23f635989dd793cd
fd058883834672b2c8ac0a3e80784fce819Â
WinUpdateHelper.dllÂ
Â
db8afdafbe39637fec3572829dd0a
1a2f00c9b50f947f1eb544ede75e499dca7Â
WinUpdateHelper.dllÂ
Â
f15098661d99a436c460f8a6f839
a6903aebd2d8f1445c3bccfc9bf64868f3b0Â
WinUpdateHelper.dllÂ
Â
3abf66e0a886ec0454d0382369dd6
d23c036c0dd5d413093c16c43c72b8ccb0bÂ
WinUpdateHelper.dllÂ
Â
767b63d11cee8cfb401a9b72d7bcc
a23b949149f2a9d7456e6e16553afcef169Â
WinUpdateHelper.dllÂ
Â
12850f78fc497e845e9bf9f10314c4ecc
6a659dcd90e79ef5bd357004021ba78Â
WinUpdateHelper.dllÂ
Â
0a8a58d18adc86977b7386416c6be8db
850a3384949b6750a6c6b2136138684aÂ
WinUpdateHelper.dllÂ
Â
1a60852904ff9c710cd754fa187ce58cb18c69
e35ea4962a8639953abe380f64Â
WinUpdateHelper.dllÂ
Â
4ab63b5ccd60dfd66c7510d1b3bc1f45f0
c31c2d4c16b63b523d05ccac3fcb9dÂ
WinUpdateHelper.dllÂ
Â
1390e61a45dd81fa245a3078a3b305
e3c7cdeb5fa1e63d9daca22096b699f9e8Â
WinUpdateHelper.dllÂ
Â
a0c3de95e5bf84cb616fe1ee1791e96ff57
53778b36201610e6730d025a6cb12Â
WinUpdateHelper.dllÂ
Â
ea65298d8d8ce4b868511a1026f8657abcc
6b2e333854f4fc1bd498463b24084Â
WinUpdateHelper.dllÂ
Â
6ea34fd213674f31a83c0eee2fb521303d2
a7c23e324bbdfa1a8edd7b6b6b6f1Â
WinUpdateHelper.dllÂ
Â
7bec5e37777e6a2ca50e765b07e8cb
65e88f4822ab19d98c32f1c69444228e5cÂ
WinUpdateHelper.dllÂ
Â
64c96f0251363aaf35c3709c134aab52b9
81508b0ce9445e42774d151e43686bÂ
WinUpdateHelper.dllÂ
Â
393f6c6b307aecfe46acc603da812cc17f
0ebf24b66632660a2e533dfa4f463fÂ
WinUpdateHelper.dllÂ
Â
94077065d049e821803986316408b
82edad43fcd5a154f6807b4382eece705c3Â
WinUpdateHelper.dllÂ
Â
a206ff592aea155d2bb42231afc3f060
494ffa8f3de8f25aaf8881639c500b44Â
WinUpdateHelper.dllÂ
Â
cb2eebf27def80261eef6b80d898e06
f443294371463accd45ca24ce132fad98Â
WinUpdateHelper.dllÂ
Â
3fea0a031ffd78c8d08f6499c2bbc
6a9edac5dc88b9ba224921f8f142e5a9adbÂ
WinUpdateHelper.dllÂ
Â
4fe5d461aaa752b94d016ca4e742e
02d30d3d4848a32787ce3564b5393017d77Â
WinUpdateHelper.dllÂ
Â
04399f9f3ef87d8dd15556628532a84
d63d628eaae0ed81166d6efbee428cdbaÂ
WinUpdateHelper.dllÂ
Â
dd37cd62fa18af798018a706f20a91a537f
0993f0254a0c84d64097c6480afb2Â
WinUpdateHelper.dllÂ
Â
1d85ffe28d065780c9327078941cb76
2915c69c69012303e45eee44c092f8046Â
WinUpdateHelper.dllÂ
Â
86e14dd0ab29ee0eab21874811b7e4
50d609feb606f77206627b62cccbd58afaÂ
WinUpdateHelper.dllÂ
Â
17704d58fb9c4e68c54a56fa97cd32599
792d00da53691b8bdb58e49296b7febÂ
WinUpdateHelper.dllÂ
Â
491019e31af8f1489aea8d4c0f9816
813698def0301a2abb88e5248b37753d2bÂ
WinUpdateHelper.dllÂ
Â
c0ab89c3d9c7b9a04df5169eb175d517
3c6de08a4ef3674cd6d7f9a925d63151Â
WinUpdateHelper.dllÂ
Â
df0ca0f15926964040bb43978f97faccc0
0bae5f6a00d8bd7d105d8c7d32efb1Â
WinUpdateHelper.dllÂ
Â
e40f2628b2981226b1afe16c1cf3796b94
82b2ac070adac999707fc09909327cÂ
WinUpdateHelper.dllÂ
Â
f6093084196acded1179d3a1466908beb
966dceaba03e1dfeb02a2628fdb0423Â
WinUpdateHelper.dllÂ
Â
fcc512630ee95d3f4c31e3aabc75ad2e29
dfacb4d4bcce7a12abe9a516979dbdÂ
WinUpdateHelper.dllÂ
Â
fe02d8d7a6b8f66624b238665d63094
a2bcd19c44a3f9c449788cadbb1b741a6Â
WinUpdateHelper.dllÂ
Â
1967f6f42710b43506a0784a28ca8785a
f91b84dfa8629ec5be92be8eec564c6Â
WinUpdateHelper.dllÂ
Â
5280b0ecb6c7246db84a9b194f5c85cc3
03c028475900b558306fdd4e51f4fc3Â
WinUpdateHelper.dllÂ
Â
ce06d83adb53c8b9d240202193ca4c04d
0163994dad707aed0f0e67fdd2a42feÂ
WinUpdateHelper.dllÂ
Â
13976bdc28d3b3ae88ed92fcf49ff9e083b
0ce5fd53e60680df00cd92bdfb33bÂ
WinUpdateHelper.dllÂ
Â
4135754b26dfac10cd19dcf6e03677b53
7244cf69fdce9c4138589e59449b443Â
WinUpdateHelper.dllÂ
Â
7d69eca36c0f69b3007cdbf908f15545
e95611acf4bad8b9e30e54687a6d33bbÂ
WinUpdateHelper.dllÂ
Â
085dc279b422d761729374b01eae1e2
2375ef9538a6c4bc7cc35e8a812450f93Â
WinUpdateHelper.dllÂ
Â
99ff2045d1377db7342420160eb254b7
b09cc4ce41a97b6bf0ec4d3f65d9ede6Â
WinUpdateHelper.dllÂ
Â
396f397099a459f3adeba057788aa3d3488
2eea7d1665c828449f205a86dc80fÂ
WinUpdateHelper.dllÂ
Â
908d35e6afd90da2e7c71cf82c8a61b5534
10ca920e67dba1bae35c2b6b19badÂ
WinUpdateHelper.dllÂ
Â
7029d68969814f1473e4e4a22abd4be8
5678a03bbe4c0f6194f3b7e421872ab3Â
WinUpdateHelper.dllÂ
Â
d3ba17aa83748c539c75cee7eedb03a4
83f2e86af10b69da3f0c8e549f014ac3Â
WinUpdateHelper.dllÂ
Â
d758820962ead89d5eaf7e45930a5eb
6ab11d5508988087faf84d8d7524408f1Â
WinUpdateHelper.dllÂ
Â
e863f45099f3dc057a5aee5990fabfb4
e8ea8849cd5bc895092ff0a305a3f85dÂ
WinUpdateHelper.dllÂ
Â
0db26e9a1213d09521fc0dbfe15f807c9
960f62bc1cf4071001f58f210c53e9cÂ
WinUpdateHelper.dllÂ
Â
94de957259c8e23f635989dd793cdfd
058883834672b2c8ac0a3e80784fce819Â
WinUpdateHelper.dllÂ
Â
Â
Â
C2 URLs Â
hxxp://85[.]235[.]75[.]242/script[.]ps11Â
Â
Â
hxxp://41[.]216[.]188[.]184/downloads/loader[.]ps1Â Â
Whether youâre a hardcore basketball fan or the office colleague who gets roped into filling out a bracket every year, March Madness is the season for brackets, office pools, and last-minute picks.Â
More than half of Americans (57%) plan to watch the NCAA basketball tournament, and 55% say they participate in some kind of betting or bracket activity during March Madness, from office pools to licensed sportsbook wagers. Â
But where thereâs excitement and money, scammers arenât far behind.Â
New research from McAfee finds that 1 in 3 Americans (32%) say theyâve experienced a betting or gambling scam, and 24% say theyâve lost money to one, with victims losing an average of $547.Â
Big events like March Madness create the perfect storm: massive attention, constant betting promotions, and fans searching online for predictions, tips, and an edge.Â
Scammers know it, and theyâre exploiting the moment.Â
This example shows an incredibly realistic, but fake, FanDuel site created by scammers to impersonate the real thing.
Why March Madness is Prime Time for Betting ScamsÂ
Sports betting promotions are everywhere during major events like March Madness.Â
According to McAfee research, 82% of Americans say theyâve seen sports betting promotions or offers in the past year, often on social media, streaming broadcasts, and sports websites.Â
That flood of promotions makes it easier for scams to blend in with legitimate content.Â
Many scams start the same way legitimate offers do, through messages, ads, or links promising bonuses or tips. But once someone clicks or responds, the situation can escalate quickly.Â
For example:Â
42% of Americans say theyâve been asked to click a link sent via email tied to a betting offerÂ
Others report links sent through social media messages or text messages directing them to betting sites, apps, or private betting groupsÂ
In many cases, victims are then asked to send money to unlock winnings, activate accounts, or access premium betting picks.Â
The payout rarely exists.Â
The Most Common Betting Scams Fans EncounterÂ
Betting scams come in several forms, but many follow familiar patterns.Â
Here are some of the most common tactics reported in McAfeeâs research:Â
Scam TypeÂ
DefinitionÂ
How It WorksÂ
Red FlagsÂ
Guaranteed Win ScamÂ
A betting scam where someone promises a âguaranteed win,â âsure bet,â or âcanât loseâ outcome in exchange for money, clicks, or sign-ups. According to McAfee Findings, about 1 in 6 Americans say theyâve received these kinds of messages, which are designed to lure fans looking for an edge.Â
Scammers send private messages, emails, or social posts claiming they have insider knowledge or a lock on a game. The goal is usually to get the victim to pay for picks, join a private group, or click a malicious link.Â
Claims that a bet is guaranteed, pressure to act fast, requests for payment to access picks, and promises that sound risk-free.Â
Fake Free Bet Promotion ScamÂ
A scam that pretends to offer bonus bets, deposit matches, or free credits through a fake sportsbook promotion.Â
The victim sees what looks like a real sportsbook offer, often through social media, email, or text. Clicking may lead to a fake site that steals login details, payment information, or deposits.Â
Unfamiliar brand names, unofficial links, urgent sign-up language, and promotions that seem unusually generous.Â
Winnings Release Fee ScamÂ
A scam where a victim is told they have winnings waiting, but must first pay a fee, deposit, or processing charge to collect them.Â
The scammer claims the user has won money, then invents a reason payment is required before the funds can be released. Once the fee is sent, the payout never arrives.Â
Requests to pay before receiving winnings, vague âprocessingâ or âverificationâ fees, and pressure to send money immediately.Â
Fake Betting App or Website ScamÂ
A scam involving a fraudulent app or website designed to look like a real sportsbook or betting platform.Â
Victims are directed to a fake platform where they may create an account, enter personal information, or deposit money. The site may appear legitimate, but withdrawals are blocked or impossible.Â
Slightly misspelled URLs, strange app download paths, poor website quality, and platforms that make deposits easy but withdrawals difficult.Â
Sportsbook Impersonation ScamÂ
A scam in which someone pretends to represent a legitimate betting platform or sportsbook support team.Â
The scammer contacts the victim claiming there is an issue with an account, a bonus, or winnings. They then ask for login credentials, payment details, or personal information.Â
Requests for passwords, bank details, or identity information; unexpected outreach; and messages pushing you to resolve an âaccount issueâ through a link.Â
Fake Insider Tip ScamÂ
A scam that uses claims of insider information, fixed games, or special access to make a betting offer sound exclusive and trustworthy.Â
Scammers position themselves as experts, insiders, or connected sources who can help the victim beat the odds. The real goal is usually payment, account access, or enrollment in a scam betting channel.Â
Claims of fixed outcomes, âinsiderâ knowledge, exclusive access, and offers that rely on secrecy or urgency.Â
Celebrity or Influencer Endorsement ScamÂ
A betting scam that uses fake or misleading celebrity, athlete, or influencer endorsements to make an offer seem legitimate.Â
Scammers create ads, videos, or posts that appear to feature a public figure recommending a betting platform, app, or tip service. In some cases, AI-generated content makes these endorsements look more convincing.Â
Endorsements that seem off-brand, videos or graphics that look unnatural, unfamiliar accounts, and promotions tied to fake urgency or suspicious links.Â
Private Betting Group ScamÂ
A scam that tries to move betting conversations into private channels like WhatsApp, Telegram, or Signal.Â
After initial contact on social media or another public platform, the scammer encourages the victim to join a private group for âexclusive picks,â âVIP bets,â or âpremium insights.â These groups are often used to pressure victims into sending money or clicking malicious links.Â
Pressure to move off-platform quickly, promises of VIP access, requests for payment to join, and little proof that the group is legitimate.Â
Who Is Most Likely to Encounter Betting ScamsÂ
McAfeeâs research found that Americans under 45 are significantly more likely to encounter betting scams, with 44% saying theyâve experienced one compared with 19% of those over 45.Â
Men also report higher exposure, with 40% saying theyâve experienced a betting scam, compared with 25% of women. Â
Men and younger adults are also more likely to participate in brackets, fantasy sports, or sportsbook betting, the same spaces where scams often appear.Â
Example of a scam March Madness betting opportunity that uses real logos and imagery
AI Is Making Betting Scams Harder to SpotÂ
Artificial intelligence is beginning to change how scams look and sound.Â
About 1 in 5 Americans say theyâve encountered betting scams that appeared more realistic because of AI, and 27% believe theyâve seen AI-generated betting content such as fake promotions, images, or videos. Â
Among those who encountered AI-driven scams:Â
58% reported AI-generated images or graphics in betting adsÂ
57% saw AI-written messages that sounded natural or personalizedÂ
45% encountered fake celebrity or influencer endorsementsÂ
36% interacted with chatbots posing as betting experts or support agents Â
As these tools improve, scam messages are becoming smoother, more convincing, and harder to distinguish from legitimate promotions.Â
Safety CheckÂ
What To DoÂ
Be skeptical of âguaranteed winsâÂ
No bet is risk-free. Ignore messages promising sure bets, insider picks, or guaranteed outcomes.Â
Use only licensed sportsbooksÂ
Stick to official betting apps and well-known sportsbooks. Avoid unfamiliar websites or apps.Â
Donât click betting links from unknown messagesÂ
If you receive a betting offer via email, text, or social media, go directly to the official site instead of clicking the link.Â
Never pay fees to unlock winningsÂ
If someone says you must send money to claim winnings or activate a betting account, itâs almost certainly a scam.Â
Be cautious of private betting groupsÂ
Invitations to âVIP betting groupsâ on apps like Telegram or WhatsApp are often used to promote scam picks or collect payments.Â
Tools like McAfeeâs Scam Detector can flag suspicious links, websites, and messages before you engage.Â
March Madness is meant to be fun, filling out brackets, debating picks with friends, and cheering for the next big upset. Betting can be part of that excitement, but itâs worth remembering that scammers are watching the tournament too.Â
A simple rule of thumb can go a long way: if a betting offer promises guaranteed wins, asks for money upfront, or pushes you to act quickly, take a step back and verify it first. Â
The safest plays are the ones where you slow down, stick to trusted platforms, and keep your personal information protected.Â
This image shows another scam site built around sports betting. Itâs important to remember these sports betting scams extend beyond basketball and the U.S.Â
If You or Someone You Know Needs HelpÂ
Sports betting can be fun, but for some people it can become difficult to manage. If you or someone you know is struggling with gambling, help is available through the National Problem Gambling Helpline (1-800-MY-RESET), operated by the National Council on Problem Gambling.Â
McAfee Total Protection has been recognized with three major honors in the AV-TEST Best Awards 2025, receiving awards for Best Performance, Best Advanced Protection, and Best Usability.Â
Among consumer security products, McAfee was the only solution to receive both the Best Performance and Best Advanced Protection awards, highlighting its ability to deliver strong security while keeping everyday devices running smoothly.Â
The awards are issued by AV-TEST, an independent cybersecurity research institute that evaluates security products through thousands of lab tests each year.Â
Together, these recognitions reinforce what matters most for people using security software every day: protection that works quietly in the background without slowing down your system or interrupting your workflow.Â
How Big is an AV-TEST Award?Â
Pretty big! The AV-TEST Awards recognize security products that deliver consistently strong results across independent testing throughout the year.Â
To qualify, products must demonstrate exceptional performance across multiple categories, including protection against modern threats, system performance impact, and usability.Â
In the 2025 test cycle, McAfee Total Protection earned recognition in three key areas.Â
Best Performance AwardÂ
Security software needs to protect your system without slowing it down.Â
In AV-TESTâs Windows performance testing, researchers measure how much a security solution impacts system resources during everyday tasks such as launching applications, installing programs, browsing the web, and copying files.Â
McAfee Total Protection earned the Best Performance Award for maintaining strong protection while keeping system impact minimal.Â
For users, that means protection that runs efficiently in the background so your PC stays responsive while you work, stream, or game.Â
Best Advanced Protection AwardÂ
Modern cyberattacks rarely rely on a single tactic. Todayâs threats often combine multiple techniques, including ransomware, infostealers, and other advanced attack methods.Â
To evaluate how well security products handle these complex threats, AV-TEST runs Advanced Threat Protection (ATP) tests, which simulate real-world attacks using the latest techniques.Â
In the 2025 testing cycle, McAfee Total Protection delivered consistently strong results across these real-world attack scenarios, earning the Best Advanced Protection Award for consumer users.Â
These results demonstrate how multiple protection layers inside the product work together to detect and stop threats, even if an attack attempts to bypass initial defenses.Â
Best Usability AwardÂ
Strong security should also be easy to live with.Â
In AV-TESTâs usability tests, researchers evaluate how accurately a product distinguishes between legitimate files and malicious ones, while monitoring for false alarms.Â
McAfee Total Protection earned the Best Usability Award for its accurate threat detection and low rate of false positives.Â
That means fewer unnecessary alerts and interruptions, while still maintaining strong protection against real threats.Â
Recognition from AV-TESTÂ
According to AV-TESTâs testing team, McAfee stood out across multiple categories in the 2025 evaluation.Â
âThe team of the AV-TEST Institute is delighted to present McAfee with three of the highly coveted trophies. The manufacturer received recognition for its consistently efficient use of system resources, clear distinction between benign and malicious files, and strong results in Advanced Threat Protection testing.â â Marcel Wabersky, Lead Mobile & Network Testing, AV-TESTÂ
What is the AV-TESTÂ InstituteÂ
Independent testing plays an important role in helping consumers evaluate cybersecurity tools.Â
The AV-TEST Institute is an independent IT security research organization based in Germany and operating for more than 20 years. The institute runs one of the worldâs largest testing laboratories dedicated to cybersecurity products.Â
From its headquarters in Magdeburg, Germany, AV-TEST researchers analyze new malware, study emerging attack techniques, and conduct large-scale comparative testing of security software used by both consumers and businesses.Â
These tests are designed to be standardized, transparent, and repeatable, allowing security products to be evaluated under the same conditions across multiple vendors.Â
The AV-TEST Best Awards recognize products that deliver consistently strong results across a full year of testing. Because the awards are based on sustained performance rather than a single test cycle, they are widely used as an indicator of long-term security reliability.Â
For McAfee users, these awards reinforce the goal behind McAfee Total Protection: delivering powerful protection that stays fast, accurate, and easy to use.Â
Frequently Asked Questions Â
FAQÂ
Q: What are the AV-TEST Best Awards? Â
A: The AV-TEST Best Awards are annual honors given by the independent cybersecurity testing institute AV-TEST. The awards recognize security products that deliver consistently strong results across a full year of testing in areas such as protection, performance, and usability.Â
Q: What awards did McAfee win in the AV-TEST Awards 2025? Â
A: McAfee Total Protection received three AV-TEST Best Awards for 2025: Best Performance, Best Advanced Protection, and Best Usability. McAfee was also the only consumer security product to receive both the Best Performance and Best Advanced Protection awards in the 2025 evaluation.Â
Q: What does the AV-TEST Best Performance award mean? Â
A: The AV-TEST Best Performance award recognizes security software that provides strong protection while using minimal system resources. AV-TEST measures how security products affect everyday activities such as launching programs, installing applications, browsing the web, and copying files.Â
Q: What is Advanced Threat Protection (ATP) testing? Â
A: Advanced Threat Protection (ATP) testing simulates real-world cyberattacks using techniques such as ransomware and infostealer malware. AV-TEST runs these scenarios to evaluate how well security products detect and stop attacks at multiple stages of an infection attempt.Â
Q: What does the AV-TEST Best Usability award measure? Â
A: The AV-TEST Best Usability award evaluates how accurately security software distinguishes between safe files and malicious threats. Products that score well demonstrate strong detection capabilities while minimizing false alarms and unnecessary alerts.Â
Q: Why do independent cybersecurity tests matter? Â
A:Â Independent cybersecurity testing organizations like AV-TESTÂ evaluate security products using standardized and transparent testing methods. These tests help consumers compare protection tools based on measurable results rather than marketing claims.Â
This week in scams, the PokĂŠmon Trainer pursuit to âcatch âem allâ is being hijacked by criminals posting fake trading card listings online; duping buyers, including young collectors, out of hundreds of dollars.Â
Meanwhile, threatening email extortion scams claiming your personal data has been stolen are flooding inboxes around the world. And a viral âwedding photoâ of Tom Holland and Zendaya shows how AI-generated images can blur the line between real and fake online.Â
Hereâs what to know.Â
PokĂŠmon Card Scams Surge on Online MarketplacesÂ
The booming market for collectible PokĂŠmon cards has become a new target for scammers.Â
According to reporting from The Straits Times, Singapore police recently arrested a 25-year-old man suspected of running a series of e-commerce scams involving PokĂŠmon trading cards. Victims reportedly lost more than $135,000 after paying for limited-edition cards that never arrived.Â
Authorities say the suspect allegedly advertised pre-orders for rare cards on the online marketplace Carousell. After receiving payment through bank transfers or digital payment apps, the seller either became unreachable or claimed there were delivery problems.Â
Police say at least 35 reports tied to the suspect have been filed since October 2025, and more broadly there have been over 600 reported PokĂŠmon card e-commerce scams totaling more than $1.1 million in losses during that same period.Â
Why this matters:Â
Collectibles create the perfect storm for online scams. Limited releases, hype, and rising resale values make buyers feel pressure to act quickly before items âsell out.â Scammers take advantage of that urgency.Â
How to Stay Safe When Buying Collectibles OnlineÂ
If youâre buying trading cards or other collectibles online:Â
Buy from authorized retailers or well-established marketplacesÂ
Avoid sellers who require direct bank transfers or payment apps upfrontÂ
Use platforms with buyer protection or escrow payment systemsÂ
Be cautious of sellers who suddenly move the conversation to WhatsApp, Telegram, or other messaging appsÂ
When demand spikes for a product, whether itâs sneakers, concert tickets, or PokĂŠmon cards, scams usually follow.Â
The âYour Data Was Stolenâ Email Extortion ScamÂ
Another scam spreading widely right now arrives in a much more intimidating format: a threatening email claiming hackers have stolen your personal data.Â
According to reporting from Fox News, many people are receiving messages that claim the sender has access to their passwords, files, or financial information. The message then demands payment in Bitcoin to prevent the data from being sold on the dark web.Â
At first glance, these emails can feel frightening. They often use dramatic language like:Â
âI have your complete personal informationâÂ
âYour files and devices are compromisedâÂ
âPay within 48 hours or your data will be leakedâÂ
But in most cases, thereâs one major problem with the claim.Â
Thereâs no proof.Â
Security experts note that these messages usually include no screenshots, no passwords, and no evidence of a real breach. Instead, scammers send the same message to thousands of email addresses at once, hoping a small percentage of recipients will panic and pay.Â
Often, the scammers obtained your email address from old data breach lists circulating online, which makes the message feel more believable.Â
What to Do If You Receive One of These EmailsÂ
If you receive a threatening extortion email:Â
Do not reply
Do not send money
Mark the message as spam or phishing
Delete it
Reporting the message helps email providers improve spam filters and prevent similar scams from reaching others.Â
The biggest tactic here is fear. Once you slow down and evaluate the message, the scam usually falls apart.Â
That Viral Tom Holland and Zendaya âWedding Photoâ? AIÂ
A viral image circulating on social media this week claimed to show Tom Holland and Zendayaâs wedding, sparking massive speculation online.Â
But many viewers quickly suspected the image wasnât real.Â
According to reporting on Yahoo Entertainment, the photo appeared to originate from a fan account on X (formerly Twitter) that claimed the image had been âconfirmedâ by major outlets like Vogue and Cosmopolitan. However, no such confirmation existed, and soon the official label was added marking the content as AI-generated.Â
A screenshot of the viral AI-generated image.
Celebrity rumors already spread quickly online. Add generative AI to the mix, and fabricated images can travel even faster.Â
While a fake celebrity wedding photo may seem harmless, the same technology can easily be used in more serious ways.Â
AI-generated visuals are already being used to create:Â
Fake celebrity endorsementsÂ
Fabricated news eventsÂ
Scam ads featuring public figuresÂ
Fraudulent investment promotionsÂ
The line between real and synthetic content is getting harder to spot.Â
How to Spot Potential AI ImagesÂ
If a viral image seems surprising or dramatic:Â
Check whether credible news outlets or verified accounts are reporting itÂ
Look for visual inconsistencies in hands, text, or background detailsÂ
Reverse image search the photo to see where it first appearedÂ
Verify through official sources before sharingÂ
When something looks shocking online, thatâs often exactly why it spreads. McAfeeâs built-in Scam Detector can help you spot AI-generated audio and video.Â
McAfeeâs Safety Tips This WeekÂ
A few simple habits can help reduce your risk across all three of these scenarios:Â
Be cautious when buying high-demand collectibles onlineÂ
Never send money in response to threatening emailsÂ
Treat viral images and breaking celebrity news with healthy skepticismÂ
Use strong, unique passwords and enable two-factor authenticationÂ
Verify surprising claims through trusted sources before reactingÂ
Scams today donât always look like scams. They often look like exciting deals, urgent warnings, or AI depictions of people you trust.Â
The best defense is slowing down before clicking, paying, or sharing.Â
Weâll Be Back Next WeekÂ
From collectible card fraud to email extortion campaigns and AI-generated viral content, the tactics scammers use may change, but the strategy is the same: manipulate emotion and urgency.Â
Stay skeptical, verify before you trust, and weâll be back next week with another breakdown of the scams making headlines, and what they mean for your security.Â
Tax season is a headache for many people, and when a shortcut promises to make filing easier, itâs hard to resist. This year, one of the newest trends is using AI chatbots like ChatGPT to help prepare tax returns.
According to new McAfee research, 30% of people say they plan to use an AI tool, such as ChatGPT, to help with their taxes, with younger adults leading the trend.Â
At first glance, it makes sense. AI tools can explain confusing tax rules, summarize IRS forms, and answer questions instantly.Â
But thereâs an important line that should never be crossed: Do not enter your personal tax information into AI chatbots.Â
That includes Social Security numbers, income records, home addresses, bank details, or anything else tied to your identity.Â
Hereâs why:Â
Typing Your Tax Info Into a Chatbot Is Like Posting It OnlineÂ
Think about it this way: when you type something into an AI chatbot, youâre sending that information over the internet to a system that processes and stores data.Â
In practical terms, entering sensitive information into an AI tool is similar to typing it directly into a search engine or submitting it to an online form.Â
Once it leaves your device, you lose direct control over where it travels and how it may be stored.Â
Even companies with strong security protections are transparent about this risk.Â
OpenAIâs privacy documentation explains that they use encryption and strict access controls to protect user data. However, they also note that no internet transmission or digital storage system can be guaranteed completely secure.Â
This is true across the internet, not just for AI tools. Â
Even Secure Systems Can Experience BreachesÂ
Security incidents can happen anywhere online, including companies with robust security programs.Â
For example, in late 2025, OpenAI disclosed a security incident involving a third-party analytics provider called Mixpanel. The breach occurred within the vendorâs systems, not OpenAIâs infrastructure, but some limited user profile data associated with the platform was exposed.Â
According to OpenAIâs disclosure, the data involved information such as:Â
Names associated with accountsÂ
Email addressesÂ
Approximate location dataÂ
Browser and device informationÂ
Importantly, chat content, passwords, payment information, and government IDs were not exposed in that incident.Â
But the event highlights a broader cybersecurity reality:Â
Even when a company takes strong security precautions, third-party services, vendors, and other parts of the digital ecosystem can still introduce risk.Â
Thatâs why cybersecurity experts recommend limiting what personal information you share online whenever possible.Â
Why Tax Data Is Especially Dangerous to ShareÂ
Tax information is one of the most valuable targets for cybercriminals.Â
If scammers obtain the details commonly found in tax filings, they may be able to:Â
Commit tax refund fraudÂ
Open financial accounts in your nameÂ
Conduct identity theftÂ
Launch highly personalized phishing attacksÂ
Tax returns typically include multiple pieces of highly sensitive data, including:Â
Social Security numbersÂ
Home addressesÂ
Employer and income informationÂ
Banking details for refundsÂ
Family member informationÂ
Entering these details into any tool outside of a secure tax platform significantly increases risk.Â
Safer Ways to File Your TaxesÂ
Instead of relying on AI chatbots for filing, stick with trusted tax preparation options designed to securely handle sensitive data:Â
Official tax software platformsÂ
Licensed tax professionalsÂ
IRS-approved free filing servicesÂ
These systems are specifically built with compliance, encryption, and identity verification in mind.Â
AI tools can be incredibly useful for learning and research. But they are not secure tax filing platforms.Â
If you wouldnât feel comfortable posting your Social Security number publicly online, you shouldnât paste it into a chatbot either. When it comes to taxes, the safest rule is simple: Use AI for advice, not for your personal data.Â
Weâre back with another roundup of must-know scams and cybersecurity news making headlines this week, including a scam that features the name of the Jim Carrey movie, The Truman Show.
Letâs break it down.Â
Why Reports Call it the âTruman Showâ ScamÂ
So, why the name of this scam?
In the 1998 film The Truman Show, the main character unknowingly lives inside a staged reality TV world where everything around him is carefully controlled. In the âTruman Showâ scam, criminals try to place victims into a similarly staged investment environment, complete with fake group chats, fake investors, and fake profits designed to build trust. It doesnât actually have anything to do with the movie.
What is the âTruman Showâ Scam?
The âTruman Showâ scam is an AI-powered investment scam where criminals create an entire fake online community to convince victims an investment opportunity is real.Â
According to reports, scammers invite people into group chats on platforms like Telegram or WhatsApp that appear full of investors sharing tips and celebrating profits. In reality, many of the participants, moderators, and conversations may be run by AI bots designed to simulate a lively trading community.Â
Security researchers say the moderator and the other âinvestorsâ in the group may actually be AI-driven bots, programmed to simulate real conversations and enthusiasm around the investment strategy.Â
The scam often includes:Â
A group chat on Telegram or WhatsAppÂ
A downloadable trading app or websiteÂ
Screenshots showing fake profitsÂ
Encouragement from âother membersâ to invest moreÂ
The app itself may appear legitimate. But in reality, it often redirects users to a malicious website where scammers collect personal and financial information.Â
Once victims deposit money, the criminals can quickly drain accounts or block withdrawals.Â
McAfeeâs State of the Scamiverse research shows just how convincing scams have become. One in three Americans (33%) say they feel less confident spotting scams than they did a year ago, as criminals increasingly use polished branding, realistic conversations, and AI-generated content to make fraudulent opportunities look legitimate.Â
Why this works:Â people naturally trust social proof. When it looks like dozens of other investors are making money, people lower their skepticism. Â
Fake Government Letters Are Targeting Residents Across TownsÂ
Another scam to be aware of this week includes spoofed letters impersonating local government offices.
According to reporting from WGME in Maine, residents in multiple towns recently received official-looking notices requesting payment for supposed municipal fees tied to development applications.Â
The letters appeared convincing. They used formal language, official seals, and department names. But there was a problem.Â
One of the notices claimed it came from a âBoard of Commissioners,â even though the town in question does not have one.Â
Officials say the letters instructed recipients to send payments by wire transfer, a method legitimate government offices almost never use for these kinds of transactions.Â
McAfeeâs experts say these scams are effective because they rely on volume. Fraudsters send thousands of letters hoping a small percentage of recipients will respond before verifying the request. And remember, these types of scams occur all the time and across the globe. While todayâs reports are in Maine, itâs important to be vigilant wherever you live.Â
Red flags to watch for:Â
Requests for wire transfers, gift cards, or crypto paymentsÂ
Pressure to pay quickly to avoid penaltiesÂ
Official-looking letters with subtle inconsistenciesÂ
Contact information that doesnât match the official government websiteÂ
The safest move is simple:Â verify the request independently. Contact the government office directly using phone numbers listed on its official website, not the ones in the letter.Â
LexisNexis Confirms Data Breach After Hackers Leak FilesÂ
Meanwhile, a well-known data analytics company is dealing with a breach after hackers published stolen files online.Â
According to BleepingComputer, LexisNexis Legal & Professional confirmed that attackers accessed some of its servers and obtained limited customer and business information. The confirmation came after a hacking group leaked roughly 2GB of stolen data on underground forums.Â
LexisNexis says the compromised systems contained mostly older or âlegacyâ data from before 2020, including:Â
Customer namesÂ
User IDsÂ
Business contact informationÂ
Product usage detailsÂ
Support tickets and survey responsesÂ
The company says highly sensitive financial information, Social Security numbers, and active passwords were not part of the exposed data.Â
However, attackers claim they accessed millions of database records and hundreds of thousands of cloud user profiles tied to the companyâs systems.Â
LexisNexis says it has contained the intrusion and is working with cybersecurity experts and law enforcement.Â
Why breaches like this matter: even when the stolen data appears limited, it can still be used in targeted phishing attacks.Â
For example, scammers might use real names, email addresses, or business roles to send convincing messages that appear legitimate.Â
Breaches often trigger waves of follow-up scams weeks or months later. (We know we cover this one a lot, but itâs key to remember!)Â
McAfeeâs Safety Tips This WeekÂ
A few simple habits can make these schemes much easier to spot.Â
Be skeptical of investment groups online. Real trading communities rarely pressure you to deposit money quickly or download unfamiliar apps.Â
Verify government payment requests independently. If you receive a letter demanding payment, contact the agency directly using information from its official website.Â
Treat breach-related messages cautiously. After a breach makes headlines, phishing emails often follow pretending to offer âaccount verificationâ or âsecurity updates.âÂ
Avoid clicking unfamiliar links in emails or texts. Tools like McAfeeâs free WebAdvisor can help flag risky websites and block known malicious pages before they load.Â
Pause before sending money or personal information. Many scams rely on urgency. Slowing down gives you time to verify whatâs real.
Weâll be back next week with another roundup of the scams and cybersecurity news making headlines and what they mean for your digital safety.Â
John C. isnât the person you picture getting scammed.Â
Heâs 36. Heâs tech-savvy. Heâs a mechanical engineer leading a team at a national energy lab in Denver. And he told us his story for one reason: âScammers will target anyone.âÂ
It began with a phone call from someone claiming to be the IRS. They said John had underpaid his taxes and needed to resolve it quickly. The caller sounded polished and convincing, so convincing that John didnât stop to question it.Â
âI thought maybe they sent back too much money [in my refund], and they needed it back,â he said. âI was just so busy and overwhelmed that I never really stopped to think about the situation.âÂ
A follow-up email arrived with IRS logos, clean formatting, and a big payment button. John was trying to move fast between classes as he finished up his PhD, and he wanted to correct the situation as quickly as possible.Â
âI was like, let me just hurry up and do this, get it over with.âÂ
He clicked. He paid. But later, when he checked his statement, he saw the charge didnât look like an IRS payment at all. In fact, it was an international charge. The whole thing was a scam.Â
John said the scammer on the phone had appealed to his emotions and been incredibly convincing. Â
âIt was absolutely masterful,â John said. âI would give him an Oscar for it.Â
And new McAfee research shows John isnât alone, with nearly 1 in 4 (23%) US adults surveyed revealing theyâve lost money to a tax scam. Â
Example of a tax scam text message
Key findings from McAfeeâs 2026 Tax Season SurveyÂ
Hereâs what our January 2026 survey of 3,008 U.S. adults found:Â
The big picture: lots of worry, not enough confidenceÂ
82% of Americans say theyâre concerned about tax fraud this season.Â
67% say theyâre seeing the same or more tax scam messages than last year.Â
40% say tax scam messages are more sophisticated than last year.Â
84% are concerned about AI making tax scams more realistic.Â
Only 29% say theyâre very confident they could spot a deepfake tax scam.Â
How often scams are reaching peopleÂ
34% say theyâve been contacted by someone claiming to be the IRS or another tax authority (phone, text, or email).Â
38% say theyâve been asked to click a link or send payment related to a âtax issue.âÂ
Common asks include SSNs (15%), birth dates (11%), addresses (10%), âyou owe back taxesâ pressure (9%), and banking details (8%).Â
Who is getting hit hardestÂ
Nearly 1 in 4 Americans (23%) say theyâve fallen for a tax scam.Â
Young adults report the highest exposure: 42% of 18â24-year-olds say theyâve fallen for at least one tax scam.Â
11% of Americans report tax-related identity theft, rising to 17% among ages 25â34.Â
The money is realÂ
Among people who say theyâve fallen for a tax scam, the average loss is $1,020.Â
Separately, nearly 1 in 5 Americans say theyâve lost money to a tax scam.Â
Tax filing is increasingly digital (and that changes the risk)Â
55% say they file taxes online (software or IRS Free File).Â
75% say they receive refunds or pay taxes electronically (direct deposit, cards, apps, EFTPS, etc.).Â
30% say they plan to use an AI tool (like ChatGPT) to help prepare taxes, especially younger adults. This is highly dangerous, even with platform security protections. For example, if an AI tool were compromised in a data breach, user messages with personal tax information (like social security numbers, home address, and more) could be made public. Â
Tax Scams Now Hit Year-Round, McAfee Labs FindsÂ
In addition to our consumer survey findings, McAfee Labs analyzed malicious URLs, apps, texts, and emails in the months leading up to filing season.Â
The major takeaway: tax scams donât wait for April.Â
Scam activity began climbing as early as November and has again continued building steadily into 2026.Â
Between September 1, 2025, and February 19, 2026, McAfee Labs identified 1,468 malicious or suspicious tax-themed unique domains, an average of 43 new fake tax websites every day.Â
In early November 2025 alone, the average number of new tax-themed malicious domains nearly doubled in just over a week. After a brief dip in late December, activity resumed climbing into February, a pattern we expect to intensify as the April filing deadline approaches.Â
A chart showing the unique, malicious domains detected by McAfeeâs Web Advisor
Â
Fake IRS Websites Are A Major ThreatÂ
Scammers are rapidly creating lookalike IRS domains that mimic official government URLs. Â
They use small changes, extra letters, added words, subtle misspellings, to trick taxpayers into believing theyâre on a legitimate IRS site.Â
Examples include domains that insert additional text around âirs.govâ or add misleading subdomains designed to pass a quick glance.Â
These fake portals are used to:Â
Steal login credentialsÂ
Harvest Social Security numbers and tax IDsÂ
Capture payment detailsÂ
Charge bogus âprocessing feesâÂ
In some cases, these sites donât just steal, they overcharge.Â
McAfee Labs observed scam services offering to file for an EIN (Employer Identification Number), something the IRS provides for free, and charging as much as $319 for it.Â
Example of a scam website we found charging for an EIN.Â
The official IRS website explicitly warns: you never have to pay a fee to obtain an EIN.Â
Other scam sites misuse legitimate policy terms, like the âFresh Start Initiative,â to harvest personal data and enroll victims in aggressive robocall and marketing campaigns.Â
Tax scams donât always steal outright. Sometimes they monetize confusion.Â
Here it shows them charging $319 for an EIN, and collecting their personal information.
How a Typical Tax Scam UnfoldsÂ
Most tax scams arenât one single message. Theyâre a sequence, designed to make you panic, click, and comply.Â
Below is the common playbook, plus the red flags that show up repeatedly.Â
*Note: Scammers may swap the details like AI voice, fake IRS videos, cloned websites, or impersonating tax software, but the pattern stays familiar.Â
StepÂ
What happensÂ
Red flags youâll see at this stepÂ
Red flags that are true every timeÂ
What to do insteadÂ
1) The hookÂ
You get a call, text, or email claiming thereâs a tax issue (refund problem, underpayment, verification needed).Â
Message arrives out of nowhere, often during busy hours; âfinal noticeâ language; spoofed caller ID.Â
Unexpected contact + urgency.Â
Donât engage. Pause. Go directly to IRS.gov or your tax providerâs official site (type it in).Â
2) The authority moveÂ
They lean hard on being âthe IRSâ or âstate tax authority,â sometimes with personal details.Â
They sound polished; may use AI voice cloning; may cite a âcase number.â Fake or meaningless case numbers are very common.Â
They want you to trust the title, not verify the source.Â
Ask for written notice and time. Real tax issues can be verified through official channels.Â
3) The linkÂ
They send a link to a âsecure portalâ or ârefund page.âÂ
Theyâre trying to pull you off official channels.Â
Never click the link. Navigate to the real site yourself. If unsure, delete it.Â
4) The data grabÂ
The site (or âagentâ) asks for SSN, banking info, login credentials, or details from a prior return.Â
Requests that are broader than needed; âverify identityâ prompts; form fields that feel too invasive.Â
They want sensitive info fast.Â
Stop. Donât type anything. If you already did, assume itâs compromised and act quickly (see next section).Â
5) The payment pushÂ
They demand payment to âavoid penalties,â ârelease your refund,â or âresolve a mistake.âÂ
Gift cards, crypto, wire transfers, payment apps; pressure to pay today; threats.Â
Urgency + unusual payment method.Â
The IRS does not demand immediate payment via text/social, and doesnât require gift cards or crypto. Verify independently.Â
6) The escalationÂ
If you hesitate, they intensify: threats, âlaw enforcement,â or AI video/audio that âprovesâ itâs real.Â
Deepfake IRS video, intimidating language, âyouâll be arrested,â âyour license will be revoked.âÂ
Fear is the product.Â
Hang up. Save evidence. Talk to a trusted person. Contact official support through verified numbers.Â
7) The aftermathÂ
You realize it was a scamâoften after noticing a strange charge or login activity.Â
Charges from odd merchants; new accounts; IRS account alerts; failed tax filing due to âduplicate return.âÂ
Shame keeps people quietâscammers count on that.Â
Report it and protect your identity right away. Youâre not alone, and itâs not your fault.Â
Key point: A message can look âofficialâ and still be fake. AI is making scam language smoother and scams more believable. The safest habit is simple: slow down, and verify using official sources you navigate to yourself.Â
What to do if youâve been involved in a tax scamÂ
First: take a breath. Scams are designed to trick you, especially when youâre overwhelmed, rushed, or just trying to fix a problem quickly.Â
John said it plainly: âDonât be embarrassed. It does happen. Itâs common⌠they will target anyone.âÂ
And heâs right. The most important thing is what you do next.Â
1) Stop the bleeding: cut off contactÂ
Stop replyingÂ
Donât click anything elseÂ
Donât send more information or moneyÂ
2) Capture proof (before it disappears)Â
Take screenshots and save:Â
Phone numbers, email addresses, usernamesÂ
The message contentÂ
Links (donât click them, just copy)Â
Payment receipts and transaction IDsÂ
3)Â Lock down your accounts (especially email)Â
If a scammer gets into your email, they can reset passwords for everything else.Â
Do this today:Â
Change your email password first, then banking/tax accountsÂ
Turn on two-factor authentication (2FA)Â
If you reused passwords anywhere, change those tooÂ
Important: If you clicked a suspicious link, downloaded a file, or gave someone remote access to your computer, make sure you use a different, trusted device (like your phone or another computer) to change passwords. Why? If a scammer installed malware or has access to your computer, they may be able to see all of your brand-new passwords as youâre making them.Â
Tip:Â A password manager like McAfeeâs can help you create strong, unique passwords quickly, without having to memorize them all.Â
4) Check for identity theft signalsÂ
Tax scams often turn into identity theft. Watch for:Â
IRS notices about a return you didnât fileÂ
Trouble e-filing because a return was already submittedÂ
Alerts about a new IRS online account you didnât createÂ
If you suspect tax-related identity theft:Â
Consider filing an IRS identity theft report (commonly done with IRS Form 14039, Identity Theft Affidavit).Â
Create or log into your IRS account periodically to review account activity (John now does this every few months).Â
IRS phishing email: If you received a scam email posing as the IRS, you can forward it to phishing@irs.gov.Â
Your bank or card provider: If you paid, contact them immediately. Even if recovery isnât guaranteed, speed matters.Â
6) Clean up your digital footprintÂ
Scammers donât just use what you give them. They also use what they can look up.Â
Removing your personal details from risky data broker sites can reduce how easily scammers can target you again. Tools like Personal Data Cleanup can help you identify where your information is exposed and guide removal.Â
7) Add protection for the next attemptÂ
Tax season scams often come in waves, especially if scammers think your info is âgood.âÂ
Helpful layers include:Â
Web protection to warn you about risky links and lookalike sites before you enter info â get our free WebAdvisor download hereÂ
Scam detection that can flag suspicious messagesÂ
Identity monitoring to alert you if key personal info shows up in risky placesÂ
Run a free antivirus scan to check your device for malware or unwanted programs (especially if you clicked a link or downloaded anything)Â
The key takeawayÂ
Tax season creates the perfect storm: time pressure, sensitive data, and a lot of official-looking communication.Â
Our research shows most people are worried, and for good reason. Scammers are getting more convincing, and AI is raising the bar on what ârealâ looks and sounds like.Â
âTell your friends, tell your family,â John said. âEveryone I know at some point has heard this story, and it might just prevent someone from losing⌠thousands of dollars.âÂ
If you remember just three things this season, make them these:Â
Pause before you click.Â
Verify through official channels you navigate to yourself.Â
If something happens, act quickly, and donât blame yourself.Â
This week in scams, weâre looking at three very different stories with the same underlying theme: trust is being exploited at scale.Â
A massive government contractor data breach has quietly grown to affect more than 25 million people. Meanwhile, a viral AI-generated image of Mary-Kate and Ashley Olsen posing in a fake luxury campaign is spreading across social media, fooling some users and alarming others.Â
And in a new threat report, OpenAI detailed how its own tools are being misused for dating scams, impersonation, and influence operations.Â
Letâs break it down.Â
The Conduent Data Breach Now Impacts 25+ Million PeopleÂ
The fallout from a ransomware attack on Conduent, one of the largest government contractors in the U.S., continues to expand.Â
According to reporting from TechCrunch, updated state-level breach notifications now indicate that more than 25 million people across the U.S. have had personal data exposed.Â
Conduent provides services tied to state benefit programs, including food assistance, unemployment systems, and other government payment processing operations. The company has said its services reach over 100 million people.Â
Data reportedly exposed in the breach includes:Â
NamesÂ
Dates of birthÂ
AddressesÂ
Social Security numbersÂ
Health insurance and medical informationÂ
TechCrunch noted that the majority of affected individuals appear to be in Oregon and Texas, based on state breach disclosures. Other states have also reported an impact.Â
The attack has been described as one of the largest government-contractor-related data breaches in recent memory.Â
Why this matters: When companies that process government benefits are hit, the exposed data often includes highly sensitive identity information. Social Security numbers combined with medical or insurance details can significantly increase the risk of identity theft and fraud.Â
How to Protect Yourself After a Major Data BreachÂ
If you believe your data may have been exposed:Â
Monitor your credit reports for unfamiliar activityÂ
Consider placing a free credit freezeÂ
Be wary of phishing emails or texts referencing benefits or account verificationÂ
Never share personal information in response to unexpected outreachÂ
Breaches like this often lead to secondary scams months later. The breach itself is only phase one. Phishing campaigns usually follow.Â
That Viral Olsen Twins âLouis Vuittonâ Image? Itâs AI.Â
A supposed luxury campaign featuring Mary-Kate and Ashley Olsen began circulating widely on X and Facebook this week, racking up millions of views.Â
The images show the twins styled in what appears to be a high-end fashion shoot, drawing numerous comments over their styling. But social media users quickly pointed out visual irregularities and inconsistencies commonly associated with AI-generated imagery.Â
A screenshot of one of the AI images making thr rounds across social media.
While this doesnât fall into our typical âscamâ roundup, the normalization of AI-generated visuals that look close enough to real to confuse people are a growing issue that can lead to real confusion and distrust.Â
We have entered a phase where:Â
Fake ads look legitimateÂ
Public figures appear in campaigns they never participated inÂ
Synthetic images spread faster than correctionsÂ
Today itâs a fashion ad. Tomorrow it could be a fake political endorsement, financial announcement, or emergency alert.Â
The takeaway: If you see a surprising campaign or announcement, verify it through official brand websites or verified accounts before assuming itâs real.Â
OpenAI Details How ChatGPT Is Being Misused
In a newly released threat report, OpenAI outlined several ways its tools have been abused by bad actors.Â
A cluster of accounts used ChatGPT to run a dating scam targeting Indonesian men, allegedly defrauding hundreds of victims per month.Â
Some accounts used the tool to generate promotional copy and ads for a fake dating platform that pressured users into completing costly âtasks.â
Other accounts posed as law firms, impersonating real attorneys and U.S. law enforcement to target fraud victims.
OpenAI also banned accounts linked to activity believed to be part of influence operations, including efforts targeting Japanese political figures.Â
OpenAI stated that the activity was detected and accounts were removed.Â
Why this matters: AI tools themselves are not inherently scams. But they dramatically lower the cost and increase the scale of fraud operations. Writing persuasive emails, generating fake legal letters, building scam ads⌠these now require fewer technical skills than ever before.Â
The technology doesnât create the criminal intent. It just accelerates it.Â
McAfeeâs Safety Tips This WeekÂ
Assume viral images could be AI-generated until verifiedÂ
Verify unexpected announcements through official websitesÂ
Treat post-breach emails as suspicious by defaultÂ
Be skeptical of online âconsultationâ invites that promise paymentÂ
Never send money to someone youâve only met onlineÂ
Weâll Be Back Next WeekÂ
From ransomware breaches to AI-generated impersonations, the pattern is clear: scammers are scaling trust manipulation with technology.Â
Stay skeptical. Verify before you click. And weâll be back next week with another breakdown of whatâs making headlines, and what it actually means for your security.Â
One minute youâre scrolling like normal. The next, your account is posting crypto promotions, sending spam DMs, or following hundreds of random accounts youâve never heard of. Sometimes you donât even notice until a friend asks why youâre suddenly âgiving awayâ gift cards.Â
If you use X for work, your personal brand, or your business, a takeover can do real damage quickly. And in many cases, the hacker isnât just trying to cause chaos, theyâre trying to use your account to scam your followers while you still look trustworthy.Â
This guide walks you through exactly what to do if your X account has been hacked: how to spot the warning signs, how to regain access, and what to change immediately so it doesnât happen again.Â
If youâre still locked out after trying these steps, X also offers an official support form for hacked or compromised accounts.Â
Signs Your X Account May Be CompromisedÂ
X account takeovers donât always start with a full lockout. Often, the first signs are strange activity you didnât authorize.Â
Watch for these red flags:Â
Unexpected posts: Tweets you didnât write, especially spam, crypto links, or promotions.Â
Unusual DMs: Messages sent from your account that you donât remember sending.Â
Account behavior changes: Random follows, unfollows, blocks, or profile changes you didnât approve.Â
Security notifications:Â Alerts from X that your account may be compromised.Â
Account info changed:Â Notifications that your email, phone number, or password was updated without your permission.Â
Password suddenly stops working: Youâre prompted to reset your password even though you didnât request it.Â
If any of these are happening, assume your account is compromised and start recovery steps immediately.Â
What to Change Immediately If Your X Account Was HackedÂ
If your X account was hacked, assume your login details may have been stolen.Â
That means simply getting back into your account isnât enough, you also need to update the passwords and settings attackers could still use.Â
Hereâs what to change right away:Â
Change your X passwordÂ
Change the password for the email account connected to XÂ
Turn on two-factor authentication (2FA)Â
Confirm your email address and phone number are correctÂ
Revoke access for any suspicious third-party appsÂ
Review X Pro / Teams access (if you use it) and remove unfamiliar usersÂ
Update any other accounts that share the same passwordÂ
Delete unauthorized posts and DMs (once you regain control)Â
If you suspect the hack started through malware or phishing, itâs also smart to update passwords for other sensitive accounts tied to your identity, like banking apps, payment apps, or your Apple/Google account.Â
One of the most common ways X accounts get hacked is through phishing.Â
Scammers impersonate:Â
X supportÂ
âverified accountâ teamsÂ
copyright warningsÂ
fake sponsorship offersÂ
fake security alerts claiming your account will be suspendedÂ
They try to pressure you into clicking a link and logging in on a fake page designed to steal your password.Â
If you receive a suspicious email or DM, donât click.Â
Instead, open X directly in the app or browser and check your account settings from there.Â
Final Tips: Recovering From an X HackÂ
A hacked X account can spread scams quickly, especially if the attacker uses your account to message followers directly.Â
The most important steps are:Â
Act quicklyÂ
Change your password immediatelyÂ
Secure the email account connected to XÂ
Revoke suspicious third-party app accessÂ
Review X Pro / Teams access if applicableÂ
Enable two-factor authentication (2FA)Â
Delete unauthorized posts once you regain controlÂ
Scan your device for malwareÂ
McAfee offers a free antivirus scan that can help you detect malware or suspicious programs that may have compromised your account in the first place.Â
And if youâre still locked out or something doesnât look right, use Xâs official support request form to report the account as hacked or compromised.Â
Frequently Asked QuestionsÂ
Q: How do I know if my X account was hacked? A: Common signs include posts or DMs you didnât send, unusual follows/unfollows, account changes you didnât authorize, security alerts from X, or a password that suddenly stops working.Â
Q: If I change my password, will the hacker be logged out? A: Changing your password is critical, but some mobile sessions may remain active. X recommends revoking app access in your settings if suspicious activity continues.Â
Q: What should I do if my email address was changed? A: Check your inbox for an email from X about the change. In some cases, you may be able to reverse it using the security link. If you canât, start account recovery immediately and submit a support request if needed.Â
Q: Should I remove third-party apps after a hack? A: Yes. X notes that malicious or untrusted third-party apps can compromise your account. Remove anything you donât recognize or no longer use.Â
Q: What if I still canât log in after resetting my password? A: Submit a hacked account support request through Xâs official form. Be sure to include your username and the last date you had access.Â
Q: Whatâs the biggest mistake people make after their X account gets hacked? A: Only changing their password. If the attacker still has access through connected apps, a compromised email account, or saved sessions, they can regain control quickly.Â
Instagram hacks donât always start with a dramatic âyouâve been locked outâ moment.Â
More often, it starts with something small: your followers asking why you just sent them a weird link. Your account suddenly following hundreds of random profiles. A post you didnât write showing up in your feed. Or an email from Instagram saying your login details were changed.Â
By the time you realize whatâs happening, scammers may already be using your account to impersonate you, message your followers, or promote fake giveaways and crypto scams through your profile.Â
This guide walks you through exactly what to do if your Instagram account has been hacked: how to spot the warning signs, how to regain access, and what to change immediately so it doesnât happen again.Â
And if youâre still having trouble at any stage, be sure to visit Instagramâs official recovery tools for additional support.Â
Signs Your Instagram Account May Be CompromisedÂ
Instagram account takeovers donât always look obvious at first. In many cases, the first signs are subtle changes you didnât make.Â
Watch for these red flags:Â
Password or email changes you didnât request: You may receive an email saying your account information was updated.Â
Suspicious login alerts: Notifications about a login attempt, new device, or verification code you didnât request.Â
Posts, Stories, or Reels you didnât publish: Scammers often post crypto promotions, fake giveaways, or sketchy links.Â
DMs you didnât send: A common tactic is using your account to message your followers with phishing links.Â
Your account starts following random accounts: Hackers may use compromised accounts to inflate scam pages or bot networks.Â
Your profile info has been edited:Â Name, bio, profile photo, or website links changed without your permission.Â
If any of these are happening, assume your account is compromised and start recovery steps immediately.Â
What to Change Immediately If Your Instagram Account Was HackedÂ
If your Instagram account was hacked, assume your login details may have been stolen.Â
That means simply getting back into your account isnât enough, you also need to update the passwords and settings attackers could still use.Â
Hereâs what to change right away:Â
Change your Instagram passwordÂ
Change the password for the email account connected to InstagramÂ
Turn on two-factor authentication (2FA)Â
Log out of all active sessions/devicesÂ
Remove suspicious third-party apps connected to your accountÂ
Confirm your phone number and email address are correctÂ
Check Accounts Center and remove linked accounts you donât recognizeÂ
Update any other accounts that share the same passwordÂ
If you suspect the hack started through malware or a phishing link, itâs also smart to update passwords for other sensitive accounts tied to your identity, like banking apps, payment apps, or your Apple/Google account.Â
Step-by-Step: How to Recover a Hacked Instagram AccountÂ
Instagram provides several recovery options depending on what information you still have access to (email, phone number, username, or trusted device).Â
One of the most common ways Instagram accounts get hacked is through phishing.Â
Scammers impersonate:Â
Instagram supportÂ
verification teamsÂ
copyright violation noticesÂ
âyour account will be deletedâ warningsÂ
fake giveaway collaborationsÂ
Their goal is to pressure you into clicking a link and entering your password on a fake login page.Â
If you receive a suspicious email or DM, donât click.Â
Instead, open Instagram directly in the app and check your security settings from there.Â
If you think you entered your login info into a suspicious link, change your password immediately and secure your account right away.Â
Final Tips: Recovering From an Instagram HackÂ
A hacked Instagram account is stressful for a reason: it doesnât just affect your profile. It affects your followers, your reputation, and your private messages.Â
The most important steps are:Â
Act quicklyÂ
Check your email for Instagram security alertsÂ
Use Instagramâs official hacked account recovery toolsÂ
Change your password immediatelyÂ
Log out of all active sessionsÂ
Remove suspicious apps and linked accountsÂ
Enable two-factor authentication (2FA)Â
Scan your device for malwareÂ
McAfee offers a free antivirus scan that can help you detect malware or suspicious programs that may have compromised your account in the first place.Â
And if youâre still locked out or something doesnât look right, follow Instagramâs official recovery guidance and contact Instagram support directly.Â
Frequently Asked QuestionsÂ
Q: How do I know if my Instagram account was hacked? A: Common signs include password or email changes you didnât request, suspicious login alerts, DMs you didnât send, posts you didnât publish, or unexpected changes to your profile details.Â
Q: What if my Instagram email address was changed? A: Check your inbox for an email from Instagram about the change. In some cases, Instagram may provide a security link that lets you reverse it. If you canât undo the change, start the hacked account recovery process as soon as possible.Â
Q: What if I canât log in at all? A: Use Instagramâs official hacked account recovery tools. Depending on your situation, Instagram may offer login links, security codes, or identity verification options to help you regain access.Â
Q: Should I remove third-party apps after a hack? A: Yes. Some account takeovers happen because an unsafe app was given access. Remove anything you donât recognize or no longer use.Â
Q: Whatâs the biggest mistake people make after getting hacked? A: Only changing their Instagram password. If the attacker still has access through your email account, linked accounts, or suspicious third-party apps, they can regain control quickly.Â
Q: Can Instagram ask me to verify my identity? A: Yes. In some cases, Instagram may ask you to confirm ownership through verification steps. This can include submitting additional information or completing a video selfie process.Â
AI is supposed to make the internet easier. But right now, itâs also making scams easier.Â
Every week, we round up the biggest scam and cybersecurity stories of the moment so you can recognize red flags, protect your accounts, and avoid the most common traps scammers are using.Â
This week in scams, weâre talking AI-powered search scams, a major fintech data breach, and an unexpected ticket fraud scheme that allegedly cost the Louvre millions.Â
Letâs jump in:Â
Google AI Overviews Are Being Used to Scam People Out of MoneyÂ
Google Search doesnât just show links anymore. Now, it often shows AI-generated summaries at the top of the page called AI Overviews, quick answers designed to save you time.Â
But according to reporting from WIRED, scammers are finding ways to exploit these AI summaries by planting fake customer support phone numbers into search results.Â
Hereâs how the scam works: Someone searches for a bank, airline, or service provider, usually something like âCompany name customer support number.â Then Googleâs AI Overview pulls a phone number from somewhere online and displays it as if itâs legitimate.Â
The problem? Sometimes that number doesnât connect you to the company at all.Â
Instead, it connects you to a scammer impersonating customer service, someone trained to sound helpful, calm, and official, while quietly steering you toward sharing payment information, account details, or verification codes.Â
This isnât just misinformation. Itâs a direct path into fraud.Â
Google told WIRED itâs working to strengthen anti-spam protections in AI Overviews, but also recommends users double-check customer support numbers through additional searches.Â
Key red flags to watch forÂ
The AI Overview provides a phone number without clearly showing where it came fromÂ
The âsupport agentâ asks for payment information immediatelyÂ
The person asks for your login credentials, bank info, or verification codesÂ
The caller pressures you to act quickly (âyour account will be frozenâ)Â
The number doesnât match whatâs listed on the companyâs official websiteÂ
How to protect yourselfÂ
If youâre looking for a customer support number, donât rely on an AI summary.Â
Go directly to the companyâs official website and find their contact pageÂ
Verify the phone number through multiple sourcesÂ
If the person on the phone asks for passwords or MFA codes, hang up immediatelyÂ
Treat any urgency or threats (âyou must act nowâ) as a scam signalÂ
The big lesson: AI can summarize the internet, but it canât always verify the truth.Â
If youâve applied for a loan, worked with a fintech service, or interacted with a home equity platform recently, this one is worth paying attention to.Â
According to BleepingComputer, fintech company Figure Technology Solutions was breached in a social engineering attack, with hackers reportedly stealing personal data tied to nearly 967,200 accounts.Â
The exposed data reportedly included names, email addresses, phone numbers, physical addresses, and dates of birth. And thatâs exactly what scammers use to build believable impersonation attempts.Â
Why this mattersÂ
Even if youâve never heard of Figure, data breaches like this can ripple outward fast. Once scammers have your email, phone number, and date of birth, they can launch more convincing scams like:Â
Fake âaccount verificationâ callsÂ
Fraudulent loan or credit applicationsÂ
Phishing emails pretending to be financial institutionsÂ
Identity theft attempts using your personal detailsÂ
And because this breach was reportedly caused by social engineering, itâs also a reminder that the weakest link in security isnât always technology, itâs human trust.Â
Key red flags to watch for after a breachÂ
Calls claiming your loan account needs immediate verificationÂ
Emails asking you to âconfirm your identityâ using a linkÂ
Messages that include personal details to sound legitimateÂ
Fake financial support agents asking for payment or login credentials
What to do right nowÂ
Change passwords (especially if you reuse them across accounts)Â
Turn on multi-factor authentication where possibleÂ
Monitor your credit report for unusual activityÂ
Be skeptical of unexpected financial messages, even if they seem personalizedÂ
After breaches like this, scammers often wait weeks or months before striking, because they know people stop paying attention. Â
A Scam at the Louvre Allegedly Cost $12 MillionÂ
Not every scam story is about malware or phishing links. Some are about old-fashioned fraud, executed at a scale that feels almost unbelievable.Â
According to reporting from The New York Times, French investigators uncovered a ticket fraud scheme that may have cost the Louvre in Paris nearly $12 million over a decade.Â
Officials say the suspected scam involved tour guides allegedly reusing tickets multiple times, bribes paid to museum employees, and tourist groups being split up to avoid additional fees.Â
Last week, police reportedly arrested nine people in the case, including two museum employees.Â
Investigators also believe similar fraud may have taken place at Versailles.Â
The Takeaway
This wasnât a one-time trick. Investigators believe the network may have been running for years, allegedly bringing in multiple tour groups per day.Â
Itâs a reminder that scammers donât always need to âhackâ a system.Â
Sometimes, they just find a weak point, then repeat it until it becomes a business model.Â
The bottom line: the Louvre story is dramatic, but the lesson is familiar. Scams thrive anywhere oversight is stretched thin, systems are overwhelmed, and people assume someone else is double-checking.Â
Whether itâs a museum ticket scanner or an AI-generated search result, scammers will always look for the fastest path through the cracks.Â
McAfeeâs Safety Tips for This WeekÂ
This weekâs scam pattern is all about one theme: trust shortcuts.Â
AI summaries that feel official. Phone numbers that look real. Support agents who sound convincing. Breach data that makes phishing more believable.Â
The best defense is slowing down and verifying before you act.Â
Here are the smartest moves to make right now:Â
Donât trust AI Overviews (or search snippets) for customer support phone numbers. Always verify through the companyâs official website.Â
Treat âcustomer serviceâ calls with caution, especially if they ask for payment info, passwords, or MFA codes.Â
Never share verification codes, even if someone claims theyâre just âconfirming your identity.âÂ
Watch for phishing attempts after major breaches. Scammers often use stolen data to make messages feel personal and urgent.Â
Be suspicious of pressure tactics like âyour account will be frozenâ or âyou must act immediately.âÂ
If you think your personal data may be exposed, monitor your credit and update your passwords now, not later.Â
Use tools like McAfee Web Protection to avoid dangerous links, bad downloads, malicious websites, and more.Â
Weâll be back next week with another roundup of the scams making headlines, and what you can do to stay ahead of them.Â
You donât always realize your YouTube channel has been hacked right away.Â
Sometimes itâs a sudden spike in notifications. Sometimes itâs a flood of confused comments. And sometimes itâs the worst-case scenario: you wake up to find your channel renamed, your videos hidden, and a scam livestream running under your brand.Â
This is one of the most common forms of creator-targeted account takeover today. Attackers hijack real channels because they already have an audience, and then use that trust to promote fake crypto giveaways, âinvestmentâ livestreams, or malicious links in video descriptions.Â
A YouTube channel hack can also put your account at risk of Community Guidelines strikes or monetization penalties, even if you didnât upload the content yourself.Â
This guide walks you through exactly what to do if your YouTube channel has been compromised: how to regain owner access, stop scam live streams fast, and secure your Google Account so it doesnât happen again.Â
Signs Your YouTube Channel May Be CompromisedÂ
A hacked YouTube channel usually means your Google Account has also been compromised, since every YouTube channel is tied to at least one Google Account.Â
Watch for these red flags:Â
Changes you didnât make: Your channel name, profile photo, handle, description, or external links were updated.Â
Videos or live streams you didnât create: You may see uploads you donât recognize, scam live streams, or replays that werenât posted by you.Â
You receive warnings or strikes: YouTube may send emails about Community Guidelines violations, copyright claims, or suspicious activity tied to content you didnât publish.Â
You canât log in or your password stops working: A sudden login failure may mean your password was changed or your account access was locked.Â
Monetization or AdSense settings changed:Â Attackers may try to redirect revenue or alter payment associations.Â
If any of these are happening, assume your channel is compromised and start recovery steps immediately.Â
What to Change Immediately If Your YouTube Channel Was HackedÂ
If your YouTube channel was hacked, assume your Google login details may have been stolen.Â
That means simply getting back into your channel isnât enough; you also need to update the passwords and settings attackers could still use.Â
Hereâs what to change right away:Â
Change your Google Account passwordÂ
Enable two-factor authentication (2FA)Â
Remove unknown devices and active sessionsÂ
Check and update your recovery email and recovery phone numberÂ
Remove any unfamiliar channel owners/managers/editorsÂ
Remove suspicious connected apps or third-party accessÂ
Review your AdSense/monetization settings for changesÂ
Update any other accounts that share the same passwordÂ
If you suspect the takeover started through malware or phishing, itâs also smart to update passwords for other sensitive accounts tied to your Google identity, like Gmail, Google Drive, banking accounts, or payment apps.Â
One of the most common ways YouTube channels get hacked is through phishing.Â
Scammers impersonate:Â
YouTube supportÂ
YouTube Partner Program emailsÂ
Copyright violation noticesÂ
Brand sponsorship offersÂ
Verification or monetization warningsÂ
They try to pressure you into clicking a link, downloading a file, or logging in through a fake Google sign-in page.Â
If you receive a suspicious email or message, donât click.Â
Instead, open YouTube Studio directly and check your account status from inside the platform.Â
Final Tips: Recovering From a YouTube Channel HackÂ
A hacked YouTube channel is stressful for a reason: it doesnât just affect your account. It affects your audience, your reputation, and your income, especially if monetization is involved.Â
YouTube may be able to help restore access, reverse changes, or provide instructions for appealing a termination if your channel was taken down during the hack.Â
Q: How do I know if my YouTube channel was hacked? A: Common signs include channel name or branding changes you didnât make, scam livestreams, videos uploaded that arenât yours, suspicious external links added to your channel, or being locked out of your account.Â
Q: Why does a hacked YouTube channel usually mean my Google Account was hacked too? A: Because YouTube channels are tied to Google Accounts. If your channel was taken over, your Google login credentials or active session may have been compromised.Â
Q: What should I do if my channel is live-streaming a crypto scam? A: End the livestream immediately if you still have access. Then change your Google password, remove unknown channel managers, enable 2FA, and remove scam links from your channel page and video descriptions.Â
Q: Can I get strikes or lose my channel because of videos the hacker uploaded? A: Potentially, yes. Scam uploads can trigger Community Guidelines or copyright violations. Thatâs why itâs important to remove unauthorized content quickly and review YouTube Studio for strikes.Â
Q: What if I canât log in at all? A: Start Googleâs account recovery process as soon as possible. If youâre still locked out after recovery attempts, visit YouTubeâs official hacked channel support resources for next steps.Â
Q: How do I know if the hacker is fully kicked out? A: Review your Google Account security settings, logged-in devices, recovery email/phone settings, and channel permissions. Remove anything unfamiliar and enable 2FA to reduce the chance of re-entry.Â
A password reset email you donât remember requesting. A login alert that doesnât make sense. Strange comments showing up under your username that you swear you didnât write.Â
Sometimes you donât notice at allâŚuntil someone messages you asking why youâre suddenly promoting crypto giveaways, posting spam links, or commenting across random subreddits.Â
A hacked Reddit account isnât just embarrassing. It can be a real security risk. Attackers often use compromised accounts to spread scams, steal personal information, or take advantage of your reputation in online communities.Â
This guide walks you through exactly what to do if your Reddit account has been compromised: how to spot the warning signs, how to regain control, and what security steps to take so it doesnât happen again.Â
Signs Your Reddit Account May Be CompromisedÂ
Reddit account takeovers donât always look dramatic at first. The earliest warning signs often feel subtle.Â
Watch for these red flags:Â
Password or email changes you didnât make: You may receive an email from Reddit saying your password or email address was updated.Â
Posts, comments, votes, or chat messages you donât recognize: Hackers often use your account to upvote scam content or spam communities.Â
Authorized apps you donât remember approving: Some attackers compromise accounts through unsafe third-party apps or browser extensions.Â
Unusual login activity or unfamiliar IP history: Reddit allows you to review recent account activity, which may show logins from locations youâve never visited.Â
Sudden account lock or forced reset notice: In some cases, Reddit may lock your account or prompt a password reset as a security precaution.Â
What to Change Immediately If Your Reddit Account Was HackedÂ
If your Reddit account was hacked, assume your login details may have been stolen.Â
That means simply getting back into your account isnât enough, you also need to update the passwords and settings attackers could still use.Â
Hereâs what to change right away:Â
Change your Reddit passwordÂ
Change the password for the email account connected to RedditÂ
Update any other accounts that share the same passwordÂ
Remove suspicious authorized appsÂ
Log out of all active sessions/devicesÂ
Turn on two-factor authentication (2FA)Â
Update your recovery options (email, phone, backup codes)Â
If you think the hack started from malware or a phishing link, itâs also smart to update passwords for other sensitive accounts, like banking, payment apps, or your Apple/Google account. Using a password manager like McAfeeâs can help you create strong, unique passwords for every account, and store them securely in one place.Â
Step-by-Step: How to Recover a Hacked Reddit AccountÂ
StepÂ
What to DoÂ
Why It MattersÂ
1. Reset your password immediatelyÂ
Use Redditâs password reset flow and create a strong new password.Â
This is the fastest way to cut off unauthorized access. Resetting your password can also log you out across devices.Â
2. Check your inbox for Reddit security emailsÂ
Look for emails saying your password or email address was changed. Follow any âthis wasnât meâ instructions if available.Â
If a hacker changed your account details, Redditâs security email may be your best chance to reverse it quickly.Â
3. Review account activity and active sessionsÂ
Check where your account is logged in and log out of unfamiliar sessions/devices.Â
Hackers often stay logged in even after making changes, especially if you donât remove active sessions.Â
4. Remove suspicious authorized appsÂ
Review connected apps and revoke access for anything you donât recognize or no longer use.Â
Some account takeovers happen through unsafe third-party apps, not password guessing.Â
If your device is compromised, attackers can steal your new password(s) immediately.Â
6. Secure the email account tied to RedditÂ
Change your email password and enable 2FA. Check recovery settings to make sure theyâre yours.Â
If your email is compromised, the attacker can keep resetting your Reddit account and locking you out.Â
7. Contact Reddit support if youâre still locked outÂ
Submit a request and choose: Security problems â I think my account has been hacked. Include your username and details.Â
Reddit may be able to help restore access or reverse changes if self-recovery doesnât work.Â
Â
Watch for Phishing âReddit Supportâ ScamsÂ
One of the most common ways accounts get compromised is through phishing.Â
Scammers impersonate:Â
Reddit moderatorsÂ
Reddit admin messagesÂ
Security alertsÂ
Fake âcopyright violationâ noticesÂ
They try to trick you into clicking a link and logging in on a fake site.Â
If you receive a suspicious message, donât click.Â
Instead, open Reddit directly in your browser or app and check your account settings from there.Â
Final Tips: Recovering From a Reddit HackÂ
A hacked Reddit account can feel strangely personal, because your profile reflects your interests, communities, and identity online.Â
The most important steps are:Â
Act quicklyÂ
Secure your email account firstÂ
Reset your password and log out of all sessionsÂ
Remove suspicious authorized appsÂ
Enable two-factor authentication (2FA)Â
Scan your device for malwareÂ
And if youâre still locked out or something doesnât look right, follow Redditâs official recovery guidance and contact Reddit support directly.Â
Reddit may be able to confirm suspicious activity, restore access, or help reverse account changes.Â
Frequently Asked QuestionsÂ
Q: How do I know if my Reddit account was hacked?
A: Common signs include password or email changes you didnât request, unfamiliar authorized apps, unusual IP history, and posts/comments/votes you donât remember making. If any of these appear, treat your account as compromised.Â
Q: Will resetting my Reddit password log out the hacker?   Â
A: In many cases, yes. Reddit notes that resetting your password can log you out across devices, which is one of the fastest ways to cut off unauthorized access.Â
Q: What if my Reddit email address was changed? Â
A: Check your email inbox for a message from Reddit. Reddit may provide instructions to reverse the change, but youâll typically need to input the original email address associated with the account.Â
Q: What should I do if I canât get my account back? Â
Q: Should I remove authorized apps after a hack? Â
A: Yes. Reddit specifically warns that unsafe authorized apps can lead to account compromise. Remove anything you donât recognize or no longer use.Â
Q: Whatâs the biggest mistake people make after a Reddit hack? Â
A: Only changing their Reddit password. If your email account or device is compromised, attackers can regain access quickly. You should secure your email, scan your device, and update reused passwords.Â
Itâs Friday the 13th, but you have nothing to fear online if youâre scam-savvy and well protected.
Every week, we round up the biggest scam and cybersecurity stories of the moment so you can recognize red flags, protect your accounts, and avoid the most common traps scammers are using.Â
This week in scams, weâre talking Valentineâs Day, deepfake deception, and online privacy.
Letâs jump in:
New McAfee Research Shows Romance Scams SpikingÂ
Valentineâs Day is supposed to be peak season for connection. But for scammers, itâs peak season for something else: emotional leverage.Â
New McAfee research shows romance scams are not rare edge cases, theyâre becoming a common part of the online dating experience. In fact, 1 in 7 American adults (15%) say theyâve lost money to an online dating or romance scam. Even more alarming: of the people who lost money, only 1 in 4 (24%) were able to recover all of it.Â
And many scams start exactly the way real relationships do.Â
One McAfee interviewee, Jules, a healthcare professional in her 40s, joined a dating app hoping to meet someone as a busy working single mom. She met âAndy,â who seemed local, charming, and emotionally invested. He didnât rush into money. He built trust. He mirrored her life. He made her feel safe.Â
Then he introduced a âcrypto opportunityâ that looked legitimate. The app showed gains. She even withdrew small amounts at first. But weeks later, her account froze, and she was told she needed to pay a $25,000 âtax paymentâ to unlock it.Â
She paid. Then the account froze again.Â
By the time Jules realized the truth, she had lost more than $80,000, including $25,000 borrowed from her elderly mother.Â
This is the new shape of romance scams: slow, believable, and psychologically engineered. McAfee Labs also reports that romance-related scam activity spikes during peak dating season, including fake profiles, cloned apps, and AI-driven spam behavior.Â
Key red flags to watch forÂ
They move fast emotionally (âIâve never felt this way beforeâ)Â
They push you off-platform quickly (WhatsApp, Telegram, Signal)Â
Their story sounds polished but hard to verify (military, oil rig, entrepreneur)Â
They introduce âinvestment adviceâ or crypto opportunitiesÂ
They ask for payment apps, gift cards, wire transfers, QR payments, or âfeesâÂ
They claim your money is âfrozenâ unless you pay one more timeÂ
How romance scams typically unfoldÂ
While scams can take many forms, most follow a familiar pattern. Understanding the progression can help people recognize risk earlier.Â
StageÂ
The Red Flags / How it Unfolds
What the scammer wantsÂ
What to do insteadÂ
1) The hook Â
A friendly DM, a âwrong numberâ text, a dating match, a comment reply, a follow requestÂ
A response. Any response.Â
Donât move fast. Keep the convo on-platform. Donât give out your number.Â
2)Â Love bombingÂ
Daily messages, fast intimacy, mirroring your interests, âIâve never felt this wayâÂ
Trust and routineÂ
Slow it down. Ask for a real-time video call and a specific, verifiable detail.Â
3) Private channelsÂ
âLetâs talk on WhatsApp/Telegram/Signal.â âDonât tell anyone yet.âÂ
Control and privacyÂ
If someone pushes you off-platform quickly, treat it as a red flag.Â
4)Â Building credibilityÂ
A âjobâ story (military, oil rig, entrepreneur), polished photos, voice notes, even AI-assisted videoÂ
BelievabilityÂ
Verify independently. Reverse image search photos. Watch for inconsistencies.Â
5) A financial requestÂ
A âsmallâ emergency, a plane ticket, a crypto opportunity, âhelp me unlock my account,â gift cards, payment app requestÂ
Money or financial accessÂ
Never send money to someone you havenât met. Never share financial info or account details.Â
6)Â EscalationÂ
âI need a verification code.â âCan you receive money for me?â âOpen an account.â âCo-sign.âÂ
Identity theft, account takeover, new creditÂ
Never share MFA codes. Donât open accounts for anyone. Lock credit if youâve shared info.Â
7)Â GhostingÂ
Ghosting, deleted accounts, new persona, rinse-and-repeatÂ
Exit before consequences hit themÂ
Preserve evidence, report, and secure your accounts immediately.Â
Key point: the scariest scams may never send you a sketchy link. They may only send convincing words, and the pressure to act.Â
Deepfake Fraud Is Going âIndustrialâÂ
Deepfake scams used to sound like something only elite hackers could pull off. Not anymore.Â
Reporting from The Guardian highlights a new analysis from AI experts suggesting deepfake fraud has gone âindustrial,â meaning itâs now cheap, scalable, and increasingly accessible to non-experts. Researchers tied to the AI Incident Database described a landscape where impersonation scams are becoming one of the most common types of AI-driven incidents reported month after month.Â
Instead of crude phishing emails, scammers can now use AI tools to generate:Â
Realistic fake videos of public figuresÂ
Fake doctors promoting productsÂ
Fake journalists endorsing scamsÂ
Realistic job applicants and âcandidatesâ who arenât real people at allÂ
One example described in the reporting involved an AI security CEO who posted a job listing and quickly received a referral for a candidate who looked perfect on paper. The resume was strong. The emails were polished. The interview was scheduled.Â
But when the video call began, the candidateâs image loaded slowly, and the background looked artificial. The face was blurred around the edges. The person glitched slightly as they spoke. A deepfake detection firm later confirmed:Â the interviewee was AI-generated.Â
The most unsettling part? Even the target didnât know what the scammer was afterâŚ. a salary? access to internal systems? company secrets?Â
This is what makes deepfake scams uniquely dangerous: theyâre not always about stealing money immediately. Theyâre often about getting trust, access, and leverage first.Â
Key red flags of deepfake impersonation scamsÂ
Video or audio glitches (especially around facial edges)Â
Backgrounds that look âtoo smoothâ or artificialÂ
Delays before video loads or odd syncing between voice and mouth movementÂ
Overly polished speech with little natural hesitationÂ
Pressure to move fast, hire fast, or approve payments quicklyÂ
This is also why deepfake fraud is so effective: it exploits the assumption that âseeing is believing.â In 2026, that assumption is no longer safe.Â
This is also backed up by McAfeeâs previous research. In 2025, McAfee Labs conducted a study of 17 different deepfake-creation tools and found that for just $5 and with just 10 minutes of setup time, scammers can create powerful, realistic-looking deepfake video and audio scams.
This example from our 2025 State of the Scamivers report shows how a deepfake creation tool can realistically transform a live video chat with our McAfee researcher into a chat with âTom Cruiseâ or âKeanu Reeves.â
Â
Google âResults About Youâ Update Shows How Personal Data Fuels ScamsÂ
Not every scam story this week is about criminals. This update is about fighting scammers, as shared by Google.Â
Google announced this week that it has expanded its âResults about youâ tool, which helps people monitor and remove sensitive personal information from Search results. Previously, the tool focused on personal contact details like phone numbers, email addresses, and home addresses.Â
Now, users can also request the removal of Search results that include highly sensitive information like:Â
This matters because personal data is often the fuel behind the scams weâve been tracking all year, including romance scams.Â
Removing sensitive data from search results doesnât erase it from the internet completely but it can reduce how easily scammers can weaponize it. To take your online privacy to the next level, consider McAfeeâs Personal Data Cleanup, which will help remove your personal information across the web. Â
What this tool helps protect againstÂ
Identity theft attemptsÂ
Impersonation scamsÂ
Doxxing threatsÂ
Fake âverificationâ schemesÂ
Social engineering and targeted romance scamsÂ
The scam lesson here is simple: the less information scammers can find, the harder it is for them to tailor the con.Â
McAfeeâs Safety Tips for This WeekÂ
This weekâs scam pattern is all about emotional manipulation + AI credibility + personal data exposure. The best defense is slowing down and verifying before you trust.Â
Here are the smartest moves to make right now:Â
Donât confuse emotional intensity with authenticity. Love bombing is a tactic, not a love language.Â
Never send money to someone you havenât met in real life, no matter how convincing their story is.Â
Treat âcrypto investing tipsâ from strangers as an immediate red flag.Â
Donât move off-platform quickly. If someone insists on WhatsApp, Telegram, or Signal early on, assume theyâre trying to isolate you.Â
Never share verification codes or screenshots of financial apps, even if they claim itâs âjust for confirmation.âÂ
Reverse image search profile photos and look for inconsistencies in background details, timelines, or personal stories.Â
If a video call feels off, trust your instincts. Deepfakes often look almost real, but âalmostâ is the danger zone.Â
Reduce your digital footprint. The more personal info available online, the easier it is for scammers to tailor believable impersonations.Â
A login alert you donât remember triggering. A password that suddenly doesnât work. A friend asking why you just posted something⌠bizarre.Â
Sometimes itâs even worse: you open your Facebook Page and realize youâre no longer an admin.Â
Facebook account takeovers often donât look dramatic at first. They start quietly: a new device login, a recovery email you didnât add, or a Page role you never approved. But once someone has access, they can lock you out fast, post scams to your followers, and even run unauthorized ads.Â
This guide walks you through exactly what to do if your Facebook account or Page has been compromised: how to spot the warning signs, how to recover access if youâre locked out, how to remove rogue admins, and how to lock down your account so it doesnât happen again.Â
Signs Your Facebook Account May Be CompromisedÂ
Facebook hacks often start quietly. The first signs usually look like small changes you donât remember making.Â
Watch for these red flags:Â
Login alerts you didnât trigger: Notifications about new devices, unfamiliar locations, or verification codes you didnât request.Â
Posts or messages you didnât send: Spam posts, strange DMs, or comments that donât sound like you.Â
Account details changed: Your password, email address, phone number, or two-factor authentication settings were updated without you.Â
Page or Business access changes: New admins added, your role downgraded, unknown partners connected, or ad accounts you donât recognize.Â
Unexpected ad spend or billing activity: Ads running that you didnât create, new payment methods, or charges you canât explain.Â
If any of these are happening, assume your account is compromised and start recovery steps immediately.Â
Step-by-Step: How to Regain Control of a Hacked Facebook PageÂ
StepÂ
What to DoÂ
Where to GoÂ
1. Secure your personal Facebook account firstÂ
Log out of all sessions, change your password, and enable two-factor authentication (2FA). If your profile is compromised, your Page will stay vulnerable.Â
Settings â Password and securityÂ
2. Check whether you still have Page accessÂ
Go to your Page and see if you can access settings. If you still have partial access, move fastâattackers often remove legitimate admins quickly.Â
Your Facebook Page â SettingsÂ
3. Review Page roles / Page accessÂ
Look for unfamiliar admins or anyone with âFull control.â Remove them immediately if you still have permission.Â
Page Settings â Page access / Page rolesÂ
4. Check Meta Business Suite permissionsÂ
Hackers may add themselves through Business Manager instead of Page roles. Review who has access to the business and Page assets.Â
Meta Business Suite â Settings â Business settings â PeopleÂ
5. Remove suspicious partnersÂ
If an unknown Business Manager or partner account is connected, remove it. Rogue partners can retain access even after passwords are changed.Â
Business settings â PartnersÂ
6. Audit Ad Accounts and active campaignsÂ
Check if unauthorized ads are running. Pause campaigns immediately and remove unfamiliar users tied to ad access.Â
Business settings â Ad accountsÂ
7. Review payment methods for fraudÂ
Look for unfamiliar credit cards or PayPal accounts. If charges occurred, contact your payment provider immediately.Â
Business settings â Payments / BillingÂ
8. Start a Page admin dispute if you lost accessÂ
If all admins were removed or your role was downgraded, submit a Page admin dispute through Metaâs Business Help tools and begin the recovery process.Â
Meta Business Help Center â Page admin dispute / compromised Page supportÂ
9. Gather proof of ownershipÂ
Prepare evidence like business documentation, domain verification, screenshots of prior Page access, and ad account billing history. The more proof you provide, the faster recovery usually moves.Â
Business documents + screenshots + domain recordsÂ
10. Lock down Page security after recoveryÂ
Remove rogue admins, reduce admin permissions, require 2FA for everyone, and limit who can manage ads. Treat this like a full security reset.Â
Page Settings + Meta Business SuiteÂ
What to Do After You Regain Control of Your PageÂ
Once youâre back in, donât stop there.Â
Attackers often return if they still have access through third-party permissions or compromised admin accounts.Â
Immediately:Â
Remove rogue adminsÂ
Remove unknown partnersÂ
Reset Page access rolesÂ
Review ad accounts and billingÂ
Turn on 2FA for everyone with Page accessÂ
Reduce admin permissions wherever possibleÂ
A good rule: most people donât need Admin access.Â
Use Editor, Advertiser, or Moderator roles unless someone truly needs full control.Â
Lock Down Facebook Security So It Doesnât Happen AgainÂ
Getting back into your account is only half the job. The real goal is making sure the hacker canât come back.Â
Turn on login alertsÂ
Facebook can notify you every time a new device logs in.Â
Go to:Â Settings â Password and security â Alerts about unrecognized loginsÂ
Turn them on for email and notifications.Â
Use stronger passwords everywhereÂ
Hackers often gain access through reused passwords from older data breaches.Â
If youâve used the same password across platforms, change it immediately.Â
Even if you removed suspicious apps earlier, do a full audit again after recovery.Â
Go to:Â Settings â Apps and websitesÂ
Remove anything you donât actively use.Â
Keep your phone and Facebook app updatedÂ
Security updates matter.Â
Running outdated apps makes it easier for attackers to exploit known vulnerabilities.Â
Watch out for phishing âMeta Supportâ scamsÂ
Many Facebook hacks donât happen through technical hacking, they happen through social engineering.Â
Common scams include:Â
Fake copyright violation noticesÂ
Fake Meta verification warningsÂ
Messages claiming your Page will be deletedÂ
âSupportâ DMs asking you to click a link and confirm loginÂ
If you ever get one of these messages, donât click.Â
Open Facebook directly, go to Settings, and check your account status from inside the platform.Â
Quick Recovery Table: What to Do If Your Facebook Account or Page Is HackedÂ
SituationÂ
What to Do (Step-by-Step)Â
Where to Go in FacebookÂ
You see a suspicious login alertÂ
1) Log out of all sessions 2) Change your password immediately 3) Turn on two-factor authentication (2FA)Â
Settings â Password and security â Where youâre logged inÂ
Your password suddenly doesnât workÂ
1) Tap Forgot password? 2) Follow recovery prompts 3) Use identity verification if neededÂ
Facebook login screen â Forgot password?Â
Youâre still logged in, but things look âoffâÂ
1) Remove unfamiliar devices 2) Check your email/phone info 3) Remove suspicious connected appsÂ
Settings â Accounts Center Settings â Apps and websitesÂ
Your email or phone number was changedÂ
1) Check your email for Facebook security alerts 2) Click âThis wasnât meâ if available 3) Start recovery and select No longer have access?Â
Email inbox + recovery flowÂ
Your Facebook Page has a new admin you didnât addÂ
1) Secure your personal account first 2) Remove the unfamiliar admin immediately 3) Review Page roles for other changesÂ
Page Settings â Page access / Page rolesÂ
You lost admin access to your PageÂ
1) Secure your Facebook profile first 2) Check Meta Business Suite permissions 3) Start a Page admin dispute with MetaÂ
Meta Business Suite â Business settingsÂ
Unauthorized ads are runningÂ
1) Pause all campaigns immediately 2) Remove unfamiliar users/partners 3) Check payment methods for fraudÂ
Business Manager â Ad accounts Business settings â PaymentsÂ
You want to prevent this from happening againÂ
1) Enable 2FA 2) Use a unique password 3) Turn on login alerts 4) Remove unnecessary adminsÂ
Settings â Password and securityÂ
Â
Final Tips: Recovering From a Facebook HackÂ
A Facebook hack is stressful for a reason: it doesnât just affect your account. It can affect your reputation, your Page, your followers, and even your finances if ads are involved.Â
The most important steps are:Â
Act quicklyÂ
Secure your email before finishing recoveryÂ
Log out all sessions and reset your passwordÂ
Remove rogue admins and unknown partnersÂ
Lock down Business Manager permissionsÂ
Enable 2FA for every admin who touches your PageÂ
Once you take control back, reduce access to only the people who truly need it, and keep a close eye on logins and billing activity.Â
With the right steps, you can recover a hacked Facebook account, remove unauthorized admins, and rebuild trust with your audience.Â
And most importantly: you can make sure it doesnât happen again.Â
A: Go to Settings â Password and security â Where youâre logged in, then select Log out of all sessions. After that, change your password and enable 2FA.Â
Q: What if my email and phone number were changed?Â
A: Start account recovery through Forgot password? and look for the option No longer have access to these? If you still have access to your original email inbox, check for Facebook security emails and use the âThis wasnât meâ link to reverse changes.Â
Q: How do I remove an admin from a Facebook Page?Â
A: If you still have Page access, go to Page Settings â Page access / Page roles and remove the person. If you no longer have admin access, you may need to start a Page admin dispute through Meta Business Help Center.Â
Q: What if someone is running ads from my Page?Â
A: Go to Meta Business Suite â Business settings â Ad accounts and pause campaigns immediately. Remove unfamiliar users or partners and check billing settings for unauthorized charges.Â
Q: Are authenticator apps safer than SMS codes?Â
A: Yes. Authenticator apps (and hardware security keys) are generally stronger than SMS because theyâre harder to intercept through SIM-swapping or text message compromise.Â
Q: Should I warn my followers?Â
A: If your Page or profile posted spam, sent DMs, or promoted suspicious links, yes. A short post warning followers not to click links or respond to messages can prevent others from getting scammed.Â