What is the "TROJAN Error Code 0xdc2dgewc" scam?
"TROJAN Error Code 0xdc2dgewc" is a technical support scam run on various deceptive websites. This scheme is presented as an alert from McAfee, a global computer security software company, however, the "TROJAN Error Code 0xdc2dgewc" scam is in no way associated with McAfee, LLC.
The scheme claims that users' devices are infected and urges them to call the provided number. No web page can scan visitors' systems, and hence any that claim to do so and/or detect threats/issues present, are scams. Trusting a tech support scam endangers device integrity and user safety.
Most people access deceptive web pages via mistyped URLs, redirects caused by intrusive advertisements or by Potentially Unwanted Applications (PUAs). This software does not need explicit user consent to be installed onto systems and, therefore, users may be unaware of its presence.
When a site promoting the "TROJAN Error Code 0xdc2dgewc" scam is accessed, it presents visitors with multiple pop-up windows. Some of them are disguised as ongoing system scan windows, threat detection warnings and, lastly, a summary of the fake scan.
The last pop-up states that the user's device is supposedly infected. The detected threat is identified as "TROJAN Error Code 0xdc2dgewc". The message in the window also informs visitors that this requires immediate attention and, if their computer is unprotected, it is at risk of various virus and malware infections.
To address the [nonexistent] issues, the scam instructs users to call the "McAfee Helpline". As mentioned, the information provided by this scheme is false. The allegedly detected threats are fake and the device was not scanned by the website. Technical support scams operate in different ways and can lead to likewise varied problems.
The fraudulent "helplines" promoted by such schemes are often presented as "toll-free", however, this is seldom the case. Scammers typically attempt to gain access to the callers' computers.
Once the devices are accessed, the criminals can uninstall genuine anti-virus tools, offer fake ones (which can be disguised as legitimate, existing cyber security products), download sensitive/compromising content stored on the system and/or infect it with malware (e.g. Trojans, ransomware, etc.).
To elaborate on how and why some of these actions are taken, system protection software can be removed so that it would not detect unwanted applications (e.g. fake anti-virus tools) or real malicious programs, infiltrated into the system by the scammers themselves.
Fraudulent system cleaning/optimization tools require activation (i.e. purchase) to perform the advertised functions, and yet remain nonoperational after activation.
Remote Access Trojans (RATs) are a common choice of malware for tech support scammers, as this malicious software ensures stealthy and potentially indefinite remote access and control over an infected system. There are several methods that scammers use to obtain vulnerable information.
For example, they can trick victims into providing it themselves, request it to be entered via phishing websites, extract it from the compromised device, and so on. Information of interest includes names, addresses, telephone numbers, emails, banking account and credit card details, etc.
The "services" that scammers offer can be extraordinarily expensive, and their "help" is at best worthless and damaging at worst. Furthermore, successfully scammed victims are often targeted repeatedly.
Therefore, by trusting "TROJAN Error Code 0xdc2dgewc" (or similar scams), users risk experiencing system infections, financial losses, severe privacy issues and even identity theft. Rogue redirects to various untrusted or malicious web pages can be caused by PUAs, however, these apps can have different capabilities and these features can be in varied combinations.
Adware-types deliver intrusive advertisements, which diminish the browsing experience and redirect to dangerous sites. Additionally, some of the delivered ads can be triggered (when clicked) to execute scripts to stealthily download/install software.
Browser hijackers are another type of PUA, which operate by making modifications to browser settings to promote bogus search engines. Furthermore, most PUAs have data tracking capabilities that are used to monitor browsing activity and to collect sensitive information extracted from it.
Data of interest includes browsing and search engine histories, IP addresses, geolocations and other personally identifiable information. The gathered data is then monetized by sharing with and/or selling to third parties (potentially, cyber criminals).
To ensure device and user safety, all suspicious applications and browser extensions/plug-ins must be eliminated immediately upon detection.
|Name||TROJAN Error Code 0xdc2dgewc tech support scam|
|Threat Type||Phishing, Scam, Social Engineering, Fraud.|
|Fake Claim||Scam claims users' devices are infected.|
|Tech Support Scammer Phone Number||+1-888-309-5548|
|Serving IP Address (patagoniafloor[.]website)||184.108.40.206|
|Symptoms||Fake error messages, fake system warnings, pop-up errors, hoax computer scan.|
|Distribution methods||Compromised websites, rogue online pop-up ads, potentially unwanted applications.|
|Damage||Loss of sensitive private information, monetary loss, identity theft, possible malware infections.|
|Malware Removal (Windows)||
To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.
"Windows Defender - Security Warning", "Microsoft Important Alert", "Trojan Spyware Alert", and "ERROR # 0x6a4-0xf9fx3999" are some examples of other technical support scams. The internet is rife with a wide variety of deceptive websites.
Popular scam models are warnings that the device is infected or at risk, alerts that a crucial software product is out of date or missing, fake prize giveaways and raffles, and so on.
Regardless of what the schemes offer, promise, claim, request or demand, the purpose is identical: to generate revenue for the scammers/cyber criminals behind them. You are strongly advised to exercise caution when browsing.
How did potentially unwanted applications install on my computer?
PUAs are often downloaded/installed together with other products. This deceptive marketing technique of pre-packing regular software with unwanted or malicious additions is called "bundling".
By rushing through download/installation of software (e.g. ignoring terms, skipping steps and sections, using "Quick/Express" settings, etc.) many users risk unintentionally allowing bundled content into their devices. Intrusive advertisements proliferate PUAs as well.
When clicked, the ads can execute scripts to download/install these applications without users' permission. Some PUAs have "official" download web pages from which they can be downloaded.
How to avoid installation of potentially unwanted applications
Download software and files from official websites and via direct links. It is not safe to use torrent clients, eMule (or other Peer-to-Peer networks), third party downloaders, unofficial websites or other sources of this kind. Avoid third party installers. Check "Advanced", "Custom" and other settings, and decline offers to download or install unwanted software.
Do not click ads that are displayed on dubious websites, since they can open other untrusted websites or even cause unwanted downloads and installations. Remove any unwanted, suspicious applications (extensions, add-ons, and plug-ins) that are installed on the browser.
The same should be applied to programs of this kind that are installed on the operating system. If your computer is already infected with PUAs, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate them.
Text presented in the final pop-up displayed by "TROJAN Error Code 0xdc2dgewc" scam:
Your PC is infected with viruses!
Your Computer is Infected with TROJAN Error code 0xdc2dgewc !
Call McAfee Helpline +1-888-309-5548.
If your PC is unprotected, it is at risk for viruses and other malware.
Back to Safety
The appearance of "TROJAN Error Code 0xdc2dgewc" pop-up scam (GIF):
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
- What is TROJAN Error Code 0xdc2dgewc tech support scam?
- How to identify a pop-up scam?
- How do pop-up scams work?
- How to remove fake pop-ups?
- How to prevent fake pop-ups?
- What to do if you fell for a pop-up scam?
How to identify a pop-up scam?
Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.
While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.
Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:
- Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
- Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
- Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
- Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
- Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.
Example of a pop-up scam:
How do pop-up scams work?
Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.
Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.
How to remove fake pop-ups?
In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.
In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.
How to prevent fake pop-ups?
To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.
To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for Windows.
What to do if you fell for a pop-up scam?
This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.
- If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
- If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
- If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for Windows) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
- Help other Internet users: report Internet scams to Federal Trade Commission.