Scareware: How Fake Security Alerts Trick Users into Installing Malware

Scareware is malware that exploits users’ fear of online threats. It presents alarming pop-up messages claiming the device is infected, then pressures the user into purchasing fake “security software” — which is itself malicious or completely useless.

“CRITICAL ERROR MESSAGE! — REGISTRY DAMAGED AND CORRUPTED.” | “WARNING: YOUR COMPUTER IS VULNERABLE! CLICK HERE TO PROTECT YOURSELF!”

How Scareware Works

  1. A user visits a legitimate site but is redirected to a malicious page that runs a fake security scan.
  2. The fake scan reports malware and generates urgent pop-ups urging software purchase.
  3. The purchased “fix” is either useless or actual malware installed on the system.

Scareware infections reached nearly 8 million in the second half of 2008 — a 48% increase from the prior six months (Microsoft Security Intelligence Report, 2009).

Warning Signs

  • Unsolicited ads promising to delete viruses, improve performance, or clean the registry.
  • Pop-ups claiming your antivirus is out-of-date and your machine is in immediate danger.
  • Unfamiliar websites initiating security scans without user action.
  • Pressure to download free “security scanners.”

Prevention Guidance

  • Shut down the browser immediately — do NOT click “No,” “Cancel,” or ✕. Use Task Manager (Ctrl+Alt+Del → End Task).
  • Search the software name in a search engine before downloading anything.
  • Legitimate antivirus vendors never use browser ads to alert users about infections.
  • Always update antivirus through the application’s own control panel, never through pop-up prompts.

Reverse Social Engineering: When the Attacker Becomes the Expert You Trust

In conventional social engineering, the attacker pretends to be a user who needs help. In Reverse Social Engineering, the attacker creates a persona of authority — a technician or IT admin — so that employees approach the attacker asking for assistance, voluntarily providing sensitive information.

Social Engineering vs Reverse Social Engineering

ApproachAttacker RoleInformation Flow
Social EngineeringPretends to be a user who lost accessAttacker asks → Employee provides
Reverse Social EngineeringPretends to be IT support / authority figureEmployee asks → Attacker receives

The Three-Step Attack Cycle

  1. Sabotage: Attacker corrupts a workstation, creating a problem that requires help.
  2. Marketing: Attacker leaves business cards or embeds their contact number in the error message, ensuring the victim calls them.
  3. Support: Attacker “solves” the problem through conversation, drawing out required information while the victim remains unsuspicious.

Prevention Guidance

  • Education is the single most effective defence.
  • Users should never provide account information without explicit supervisor authorisation.
  • Establish official IT support channels — all support contacts must go through them.
  • All employees should be included in security awareness training.
  • Suspicious behaviour should always be reported, regardless of how authoritative the person seems.