You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

What shall I do after I allowed the Fancy World Wide remote operate on the MacBook?

MacBook suddenly beep loudly and warned me to call a given number. I called, Jason Ken with number of 2*3 **2 ***6 ext 101, guided me to let him "check" my system remotely. I finally realized that they would not be APPLE service when they wanted to get all of information on my credit card.


What is the potential risks after this guy had operate on my computer? What shall I do?


Thanks for your advice.



[Edited by Moderator]

MacBook, macOS 13.6

Posted on Jul 31, 2024 10:04 AM

Reply
2 replies

Jul 31, 2024 4:40 PM in response to John Galt

John Galt wrote:

First please review Phony "tech support" / "ransomware" popups and web pages - Apple Community. The right thing to do would have been to close the web page and just forget about it.

Now that you contacted "Jason Ken", a criminal, and (presumably) agreed to let them in and root around your Mac, the possibilities are essentially limitless. He or she would have had unfettered ability to do anything you could do — as an authorized user of that Mac.


Including installing key stroke logger spyware – which might have been misleadingly named something else, so that you wouldn't realize what the criminal was installing on your system.


If that was in place, they could sit back and wait for you to enter account names and passwords, and bank and credit card account numbers.

Jul 31, 2024 1:20 PM in response to XinmeiLin

First please review Phony "tech support" / "ransomware" popups and web pages - Apple Community. The right thing to do would have been to close the web page and just forget about it.


Now that you contacted "Jason Ken", a criminal, and (presumably) agreed to let them in and root around your Mac, the possibilities are essentially limitless. He or she would have had unfettered ability to do anything you could do — as an authorized user of that Mac.


In an abundance of caution you should follow the recommendations in that User Tip, under its Appendix. However, only you can know or suspect what actions that criminal may have taken since you were present and watching whatever was being done. No one here could hazard a guess what that may have been.


In most cases, those criminals are simply seeking the low-hanging fruit: your credit card number, bank account information, that sort of thing. Money.

What shall I do after I allowed the Fancy World Wide remote operate on the MacBook?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.