Protect Yourself from the “Your Identity Has Been Stolen!” Scam

In today’s digital age, online scams are becoming increasingly prevalent. One such scam that you need to be aware of is the “Your Identity Has Been Stolen!” pop-up scam. This deceptive scheme tricks users into believing that their device is infected and their identity has been compromised. In reality, this scam is nothing more than a ploy to promote harmful software or bogus security services. In this article, we will explore the different aspects of this scam and provide you with tips on how to protect yourself.


What is the “Your Identity Has Been Stolen!” scam?

The “Your Identity Has Been Stolen!” scam preys on unsuspecting internet users by falsely claiming that their device is infected and their identity has been compromised. The scam often masquerades as the reputable McAfee anti-virus software, using a fake interface to instill a sense of legitimacy. Once the user is hooked, a pop-up window appears, mimicking a system scan and listing multiple threats supposedly detected on the user’s device. The pop-up claims that the infections include spyware, trojans, and adware, and warns the user that their identity has been stolen. The scam then urges the user to take immediate action to protect both their identity and their computer.

It is important to note that all the claims made by this scam are false. The content displayed in the pop-up is not affiliated with McAfee or any legitimate security software. Furthermore, no website has the capability to detect issues on a visitor’s device. Scammers use this deceptive content to promote fake anti-virus tools, adware, browser hijackers, and potentially unwanted applications. In some cases, this scam may even lead to the download of malware such as trojans, ransomware, or cryptominers.

How does the “Your Identity Has Been Stolen!” scam work?

The “Your Identity Has Been Stolen!” scam operates by exploiting various techniques to trick users into believing their device is infected. One common method is through redirects generated by websites that use rogue advertising networks. These networks force-open scam pages when users interact with certain content on the site, such as clicking on buttons or ads. Another way users may encounter this scam is through mistyped URLs or intrusive ads. Additionally, adware can display advertisements that promote online scams and redirect users to scam websites.

Recommended Anti-malware tools:

The easiest and most modern way of removing pop-ups, trojans, ransomware, or other viruses is to use automatic removal tools. See our Anti-malware tools below for further instructions.

Try SpyHunter

SpyHunter is a powerful tool that is able to keep your Windows clean. It would automatically search out and delete all elements related to malware. It is not only the easiest way to eliminate malware but also the safest and most assuring one. The full version of SpyHunter costs $42 (you get 6 months of subscription). By clicking the button, you agree to EULA and Privacy Policy. Downloading will start automatically.

Download SpyHunter

for windows

Try SpyHunter for Mac

SpyHunter for Mac fully removes all instances of newest viruses from Mac/MacBook and Safari. Besides, leaner can help to optimize MacOS and free up disk space. Compatible with all versions of MacOS. The free version of SpyHunter for Mac allows you, subject to a 48-hour waiting period, one remediation and removal for results found. The full version of SpyHunter costs $42 (you get 6 months of subscription). By clicking the button, you agree to EULA and Privacy Policy. Downloading will start automatically.

Download SpyHunter for Mac

MacOS versions

Recognizing and avoiding pop-up scams

Pop-up scams, including the “Your Identity Has Been Stolen!” scam, can be difficult to spot as scammers go to great lengths to make them appear genuine. However, there are certain characteristics you can look out for to help identify and avoid falling victim to these scams:

  1. Spelling mistakes and unprofessional images: Pay close attention to the content of the pop-up. Spelling mistakes and poorly designed images are often signs of a scam.
  2. Sense of urgency: Scammers create a sense of urgency by using countdown timers or urgent messages to prompt users to take immediate action.
  3. False claims of winning something: If you haven’t participated in a contest or lottery and receive a pop-up claiming you’ve won something, it is likely a scam.
  4. Fake computer or mobile device scans: Legitimate websites cannot perform system scans on your device through a pop-up. Any pop-up claiming to scan your device for issues is a scam.
  5. Exclusivity: Pop-ups that promise exclusive access to financial schemes or other opportunities that seem too good to be true are likely scams.

By being aware of these red flags, you can better protect yourself from falling victim to pop-up scams.

Preventing encounters with scam websites

To minimize the risk of encountering scam websites like the “Your Identity Has Been Stolen!” scam, follow these preventive measures:

  1. Visit reputable websites: Avoid visiting websites that offer pirated media or software, illegal streaming or downloading services, or other questionable services. These sites often use rogue advertising networks that promote deceptive content.
  2. Pay attention to URLs: Enter website URLs carefully to avoid accessing fake webpages that are designed to trick users by using misspelled or similar-looking URLs.
  3. Deny browser notifications: When prompted by a website to allow notifications, exercise caution. Do not click “Allow” if you are unsure about the legitimacy of the website. It is best to ignore or deny notification requests.
  4. Download from official sources: To prevent bundled or harmful programs from infiltrating your system, only download software from official or verified sources. Read the terms and conditions, use custom installation settings, and opt out of any additional applications or extensions.
  5. Use reputable antivirus software: Install and regularly update reputable antivirus software to protect your device from malware and potential online scams.

By following these preventive measures, you can significantly reduce your chances of encountering scam websites.

What to do if you encounter a pop-up scam?

If you come across a pop-up scam like the “Your Identity Has Been Stolen!” scam, it is important to take the appropriate actions to protect yourself:

  1. Close the pop-up: If possible, simply close the pop-up. In some cases, scam pop-ups may be difficult to close. If this happens, close your internet browser and restart it.
  2. Reset your internet browser: If closing the pop-up is not enough, you may need to reset your internet browser. Instructions on how to reset your browser settings can be found in our guide on resetting browser settings.
  3. Scan your device for malware: If you suspect that your device may have been compromised, run a scan using reputable antivirus software. This will help detect and remove any potential threats that may have been installed by the scam.
  4. Report the scam: Help protect other internet users by reporting the scam to relevant authorities, such as the Federal Trade Commission. Reporting scams can help raise awareness and prevent others from falling victim to similar schemes.

By taking these actions, you can mitigate the potential harm caused by encountering a pop-up scam.


The “Your Identity Has Been Stolen!” scam is just one example of the many online scams that exist today. It is crucial to stay vigilant and be aware of the tactics scammers use to deceive unsuspecting users. By recognizing the characteristics of pop-up scams and following preventive measures, you can protect yourself from falling victim to these scams. Remember to always verify the legitimacy of websites, be cautious when allowing browser notifications, and use reputable antivirus software to safeguard your device. By staying informed and taking proactive steps, you can navigate the online world safely and protect yourself from scams.

Leave a Reply

Your email address will not be published. Required fields are marked *