Network Security Breach Tech Support Scam is a new malicious application that slithers onto computers to lock users’ screens. It does that to scare users into believing that suspicious activity has been detected on their computers and, as a consequence, they need to take action as soon as possible: enter the product key or contact the technical support. Although this infection was developed in India, as researchers working at 411-spyware.com have revealed, it might show up on users’ computers no matter where they live. It is impossible not to notice the successful entrance of Network Security Breach Tech Support Scam because it immediately kills the explorer.exe process of Windows Explorer and places its own window instead, thus locking the screen completely. It might look like a genuine Windows OS window at first glance, but it is not, believe us. It is just a fake window that is opened on your screen with the intention of convincing you that there is something wrong with your PC. Ignore the message it contains completely and, instead, rush to remove Network Security Breach Tech Support Scam from your system because it is the only effective solution to the problem. If you do nothing, the fake window will not disappear from your screen itself, meaning that you could not use your computer normally.
If the first thing you see after turning on your computer is the blue window that cannot be moved, you must have encountered Network Security Breach Tech Support Scam. It seeks to convince users that there are problems they need to fix as soon as possible. Specifically speaking, you will be told that “Microsoft Windows has detected some suspicious activities on this computer. Due to having a Network Security Breach your Microsoft Windows got de-activated.” Of course, these are pure lies, so do not go to enter your Windows license key because it might be stolen by cyber criminals. You should not dial the provided telephone number (1-866-324-2085) either because the chances are high that you will contact cyber criminals. They will not help you to eliminate the window opened on your Desktop. It is more likely that they will try to sell you a useless application. They might also convince you to grant them remote access to the computer and then steal some personal details/install malicious software without your knowledge. Last but not least, they might try to extract information they could later sell in the black market from you. Finally, there are no guarantees that the provided telephone number is toll-free, which means that you might also get a large telephone bill after making a call.
It is no longer a secret how Network Security Breach Tech Support Scam usually shows up on users’ computers. Research has shown that it pretends to be PCCleaner, a PC cleaner/optimizer, so it is not a surprise that users do not know anything about its entrance until they find their screens locked. Cyber criminals might start promoting it as another useful program too, so if you download many programs from file-sharing and similar pages, you should be more cautious from now on. Unfortunately, we cannot promise that it is the only way how this scam can show up on users’ PCs and make modifications on it. Because of this, we highly recommend that all users whose computers are connected to the Internet go to install security software on their computers. There is no other easier way to ensure the system’s maximum protection.
Network Security Breach Tech Support Scam is one of those nasty infections, so do not expect to erase it easily from your system. The first thing you need to do before you go to uninstall it from your computer is unlocking the screen, i.e. you must remove the screen-locking window. You can do this by pressing Ctrl+Shift+S simultaneously on your keyboard or entering one of the two available unlock codes (you will find them provided in our removal guide) in the Product Key box. Once the screen is unlocked, follow our step-by-step manual removal instructions to remove Network Security Breach Tech Support Scam fully. As you can see, you will need to restore the killed explorer.exe process yourself too, so we cannot promise that its removal will be a piece of cake.
|#||File Name||File Size (Bytes)||File Hash|
|1||microsoft.exe||591360 bytes||MD5: 8bf22fe19af6c5d4685abf547ca050e4|
|2||PC_cleaner.exe||591360 bytes||MD5: ce63df902344e3eb13d12c9301a13fef|
|3||PC_cleaner_database.exe||208896 bytes||MD5: 89e5aa87672ad89e624d6d0730fdb701|
|4||MicrosoftTool.exe||13824 bytes||MD5: 8ef9fd5a2f625d9bfe749e4f40dc7ea2|
|#||Process Name||Process Filename||Main module size|