Connect with us

Technology

Fake PayPal email let hackers access computer and bank account

Published

on

Fake PayPal email let hackers access computer and bank account

Online scams are becoming more dangerous and convincing every day. Cybercriminals are finding new ways to gain not just your login credentials but full control of your computer and your bank accounts.

Take John from King George, Virginia, for example. He recently shared his alarming experience with us. His story is a powerful warning about how quickly things can escalate if you respond to suspicious emails.

Here is what happened to John in his own words: “I mistakenly responded to a false PayPal email notifying me of a laptop purchase. The message looked real, and I called the number listed. The person on the phone gave me a strange number to enter into my browser, which installed an app that took control of my PC. A warning popped up saying ‘software updating – do not turn off PC,’ and I could see my entire file system being scanned. The scammer accessed my bank account and transferred money between accounts. He told me to leave my PC running and go to the bank, keeping him on the phone without telling anyone what was happening. I shut everything down, contacted my bank, and changed my passwords.”

John’s quick thinking in shutting down his computer and alerting his bank helped minimize the damage. However, not everyone is as lucky.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Advertisement

Fake PayPal scam email (Kurt “CyberGuy” Knutsson)

How this scam works

This type of scam is known as a remote access scam. It often begins with a fake email that appears to come from a trusted company like PayPal. The message claims there is an issue, such as an unauthorized charge, and urges the victim to call a phone number or click a link. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once the scammer makes contact, they guide the victim to enter a code into their browser or install a program, claiming it will fix the problem. In reality, this grants the scammer full control of the victim’s computer. 

Once inside, scammers often search for sensitive files, access banking websites, steal login credentials or install malware to maintain long-term access. Even if the immediate scam is stopped, hidden malware can allow scammers to reenter the system later.

Advertisement
hacker on laptop

A hacker at work (Kurt “CyberGuy” Knutsson)

THE URGENT PAYPAL EMAIL SCAM YOU CAN’T AFFORD TO IGNORE

Key takeaways from John’s experience

John’s close call highlights several important lessons.

Fake emails are harder to spot than ever: Scammers create emails that look almost identical to real ones from trusted companies like PayPal. They copy logos, formatting and even fake customer support numbers. Always double-check the sender’s email address and verify communications by visiting the official website or app directly instead of clicking links inside emails.

Remote access scams can escalate fast: Once scammers gain control of your device, they can steal sensitive data, move funds between accounts and install hidden malware that stays behind even after the scammer disconnects. It often takes only minutes for serious damage to be done, making fast recognition critical.

Psychological pressure plays a big role: Scammers rely on creating a sense of urgency and fear. By keeping you on the phone and urging secrecy, they isolate you from help and rush you into making bad decisions. Recognizing when you are being pressured is key to breaking the scammer’s control.

Advertisement

Fast action can make all the difference: By quickly disconnecting his computer and contacting his bank, John limited the scammer’s access to his accounts. Acting within minutes rather than hours can stop further theft, block fraudulent transactions and protect your sensitive information from being fully compromised.

laptop

A warning on a laptop home screen (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

How to protect yourself from remote access scams

Taking simple but strong security steps can protect you from falling victim.

1. Never call a number listed in a suspicious email: Scammers often set up fake phone numbers that sound professional but are designed to manipulate you into handing over control or information. Always find verified contact information through a company’s official website or app, not links/numbers provided in suspicious messages.

Advertisement

2. Be skeptical of unusual instructions: No legitimate company will ask you to install software or enter strange codes to protect your account. If anything seems unusual, trust your instincts and stop the communication immediately.

3. Install strong antivirus software on all devices: Antivirus programs can detect suspicious downloads, block remote access attempts and help prevent hackers from taking over your system. Having strong antivirus protection installed across all your devices is the best way to safeguard yourself from malicious links that install malware and attempt to access your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Use identity theft protection: These services monitor financial accounts, credit reports and online activity for signs of fraud, alerting you to suspicious transactions. See my tips and best picks on how to protect yourself from identity theft.

5. React immediately if you suspect a scam: Disconnect your device from the internet, contact your bank or credit card company immediately and change your passwords, especially for banking and email accounts. Monitor your accounts closely for unauthorized activity and report the scam to the Federal Trade Commission as well as the company that was impersonated. Acting quickly can prevent further access and limit the damage scammers can cause.

6. Use multifactor authentication (MFA): MFA adds a critical layer of security beyond passwords, blocking unauthorized logins even if credentials are stolen. Enable MFA on all accounts, especially banking, email and payment platforms, to stop scammers from bypassing stolen passwords.

Advertisement

7. Update devices and software immediately: Regular updates patch security flaws that scammers exploit to install malware or hijack systems. Turn on automatic updates wherever possible to ensure you’re always protected against newly discovered vulnerabilities.

8. Employ a password manager with strong, unique passwords: Avoid password reuse and use complex passphrases to minimize credential-stuffing attacks. A password manager generates and stores uncrackable passwords, eliminating the risk of weak or repeated credentials. Get more details about my best expert-reviewed password managers of 2025 here.

9. Never share screen access or grant remote control: Scammers exploit screen-sharing tools to steal passwords and manipulate transactions in real time. Legitimate tech support will never demand unsolicited screen access; terminate the call immediately if pressured.

10. Invest in personal data removal services: These services automate requests to delete your personal information from data brokers and people-search sites, reducing publicly available details scammers could exploit for phishing or impersonation. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

PROTECT YOURSELF FROM TECH SUPPORT SCAMS

Advertisement

Kurt’s key takeaways

John’s story is a reminder that online scams are evolving quickly and becoming more aggressive. Staying skeptical, verifying all suspicious messages and acting quickly if something feels wrong can make the difference between staying safe and losing sensitive information. Protect your devices, trust your instincts and remember it is always better to be cautious than to take a risk with your security.

Have you or someone you know been targeted by a scam like this? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Anker is recalling over 1.1 million power banks due to fire and burn risks

Published

on

Anker is recalling over 1.1 million power banks due to fire and burn risks

The recall covers about 1,158,000 units that were sold online through Amazon, Newegg, and eBay between June 2016 and December 2022. The affected batteries can be identified by the Anker logo engraved on the side with the model number A1263 printed on the bottom edge. However, Anker is only recalling units sold in the US with qualifying serial numbers. To check if yours is included, you’ll need to visit Anker’s website.

Anker is offering affected consumers their choice of either a $30 gift card (the recalled battery cost around $27) that can be used on Anker.com, or a free 10,000mAh Anker power bank as a replacement (model A1388) featuring upgrades including a charge level display and a USB-C charging cable lanyard.

To receive the gift card or the replacement, Anker requires a “photo of the power bank with the submission date and the word ‘recall’ or ‘recalled’ written clearly in permanent marker,” to be submitted, and a “photo showing the model number and serial number (SN) printed on the bottom of the device.” The company is also requesting a purchase receipt, but it’s not mandatory to participate in the recall.

After confirming that your power bank is one of the recalled units, Anker says it should be taken to a facility that can safely dispose of lithium-ion batteries due to the risk of fire. Those facilities can be found through the Environmental Protection Agency’s website or other organizations in the US that specialize in processing e-waste. Do not throw them in the trash, recycling bins, or used battery boxes provided at various retail locations.

The recall is also a reminder that power banks and backup batteries can potentially develop severe issues over time, as these particular units are almost a decade old. If you’ve been regularly using devices featuring lithium-ion batteries for a while, you’ll want to be mindful of issues like overheating or visible swelling and dispose of them properly if you think there’s a potential problem. And while the technology is currently more expensive than lithium-ion batteries, you can also consider upgrading to solid-state batteries which are more powerful, safer, and longer lasting than what we commonly use now to power our devices.

Advertisement
Continue Reading

Technology

FBI warns over 1 million Android devices hijacked by malware

Published

on

FBI warns over 1 million Android devices hijacked by malware

NEWYou can now listen to Fox News articles!

Everything that connects to the internet can be hacked by malware. 

This includes your phones (both Android and iPhones) and laptops (whether Windows, Mac or even lesser-known systems like Linux). Devices like your Wi-Fi router and security cameras aren’t safe either.

But who would have thought hackers are now targeting your smart TVs, streaming boxes, projectors and tablets, too? That’s right, the FBI warns that bad actors have hijacked over a million of these devices with malware, turning them into unwitting participants in a global cybercrime network.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Advertisement

Remote control and smart TV (Kurt “CyberGuy” Knutsson)

FBI warns: Over 1 million smart devices infected with BadBox 2.0 malware

The FBI is warning that more than a million smart TVs, streaming boxes, projectors and tablets have been infected by a massive malware operation called BadBox 2.0. The malware turns home electronics into participants in a global network of cybercrime, often before the user even powers them on.

In a statement, the FBI says BadBox 2.0 is commonly found on cheap Android-based devices manufactured in mainland China. These include uncertified tablets, connected TV boxes and other Internet of Things hardware. Many of the infected devices ship with the malware preinstalled. Others are compromised during setup, often through malicious firmware updates or sideloaded apps from unofficial marketplaces.

FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOW

Once infected, the devices connect to a command and control server, allowing hackers to reroute malicious traffic through home networks, load fraudulent ads in the background and carry out credential-stuffing attacks without the user knowing. Essentially, your smart TV could be quietly helping someone break into other people’s accounts.

Advertisement

The botnet is primarily used to turn infected devices into residential proxy nodes, providing hackers with anonymous access to real home IP addresses. That means your TV or projector might unknowingly be helping cybercriminals bypass security systems, commit ad fraud or brute-force online accounts while hiding behind your internet connection.

person with tablet

A person holding a tablet (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Badbox malware history: From TV boxes to over 1 million infected devices

BadBox first appeared in 2023 on generic TV boxes, such as the T95. The original botnet was briefly disrupted in Germany in 2024 when security researchers “sinkholed” the malware’s command servers. That wiped out part of the operation, but not for long. Just a week later, the malware reappeared on nearly 200,000 devices, including more recognizable brands like Hisense smartphones and Yandex TVs.

By March 2025, BadBox had evolved into BadBox 2.0, with more than 1 million active infections detected by HUMAN’s Satori Threat Intelligence team. The majority of devices are uncertified Android Open Source Project builds. These are not official Android TV OS products and are not protected by Google Play Protect.

Researchers say the malware has been spotted in 222 countries. A significant number of infections are concentrated in Brazil, followed by the United States, Mexico and Argentina.

Advertisement

The FBI, working with Google, Trend Micro, HUMAN and the Shadowserver Foundation, recently disrupted communications between more than 500,000 infected devices and their control servers. However, the botnet continues to grow as more compromised products reach consumers and remain unnoticed.

Symptoms of infection include strange app marketplaces, disabled Play Protect settings or devices advertised as being unlocked or capable of free streaming. Many of these products come from unknown brands and are sold through unofficial sellers. If you have recently purchased a budget Android TV box or projector, especially one that is not certified by Google, you may want to take a closer look.

a smart television

Smart TV (Kurt “CyberGuy” Knutsson)

ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELY

How to tell if your device might be infected with BadBox 2.0

If you’re wondering whether your smart TV, streaming box, projector or tablet could be part of the BadBox 2.0 botnet, here are some warning signs and checks you can do.

1. You bought a low-cost Android-based device from an unknown or no-name brand: Devices sold online through third-party sellers or unknown brands, especially if advertised as “unlocked,” “jailbroken” or offering free streaming, are at higher risk. Models like the T95 box or other generic Android TV boxes are known carriers. Specifically, the following devices have been identified as impacted by BadBox malware:

Advertisement

Device model: TV98, X96Q_Max_P, Q96L2, X96Q2, X96mini, S168, ums512_1h10_Natv, X96_S400, X96mini_RP, TX3mini, HY-001, MX10PRO, X96mini_Plus1, LongTV_GN7501E, Xtv77, NETBOX_B68, X96Q_PR01, AV-M9, ADT-3, OCBN, X96MATE_PLUS, KM1, X96Q_PRO, Projector_T6P, X96QPRO-TM, sp7731e_1h10_native, M8SPROW, TV008, X96Mini_5G, Q96MAX, Orbsmart_TR43, Z6, TVBOX, Smart, KM9PRO, A15, Transpeed, KM7, iSinbox, I96, SMART_TV, Fujicom-SmartTV, MXQ9PRO, MBOX, X96Q, isinbox, Mbox, R11, GameBox, KM6, X96Max_Plus2, TV007, Q9 Stick, SP7731E, H6, X88, X98K, TXCZ

2. Your device is not Google-certified: If your Android device doesn’t support Google Play Protect or doesn’t show the Play Protect certification in the Play Store settings, it’s likely running on an uncertified version of Android. That’s a major red flag. To check:

  • Open the Google Play Store.
  • Tap your profile icon > SettingsAbout.
  • Look for Play Protect certification. If it says “Device is not certified,” that’s a problem.

3. Suspicious behavior or strange apps: Look for unfamiliar apps you didn’t install, apps labeled with foreign characters or alternative app stores on your device. BadBox-infected devices often come with shady apps preloaded.

4. Google Play Protect is disabled: If Play Protect has been turned off without your knowledge or is missing altogether, your device may be vulnerable to compromise.

5. Your home internet is acting strange: If your network is unusually slow or your router shows unknown devices connected, one of your smart devices may be hijacked and rerouting traffic as part of a residential proxy network.

6. The device came with outdated or unofficial firmware: If your device doesn’t receive software updates or has a strange update process, that’s another potential sign it’s not legit or may be compromised.

Advertisement

FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE

8 ways to protect your devices from BadBox 2.0 and Android malware

Want to stay safe? Here are eight practical steps you can take to protect your smart devices from BadBox 2.0 malware and other hidden Android threats.

1. Use strong antivirus software: Protecting your devices starts with powerful antivirus protection. Malware like BadBox 2.0 often comes preinstalled on cheap, uncertified Android devices, infecting them before you even power them on. A trusted antivirus app can help detect hidden threats, block malicious traffic and warn you about suspicious behavior that might otherwise go unnoticed. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Only buy certified and trusted devices: Stick to devices certified by Google or other recognized platforms. Avoid generic or off-brand Android boxes, tablets and projectors, especially if they are advertised as unlocked or include free streaming. Cheap, uncertified devices are more likely to come with malware preinstalled.

3. Avoid sideloading apps from unofficial sources: Do not install apps from third-party app stores or download APK files from unknown websites. These files can contain hidden malware. Use only official app stores like the Google Play Store that scan apps for threats.

Advertisement

4. Check your device settings for tampering: Look for signs like Google Play Protect being turned off, the presence of unfamiliar app stores or suspicious apps running in the background. These are possible signs your device is compromised.

5. Monitor your network for unusual activity: If your internet slows down suddenly, or you notice unknown devices on your Wi-Fi, investigate. Use your router’s settings or a network monitoring app to track strange behavior or unauthorized connections.

6. Disconnect and replace suspicious hardware: If a device is behaving oddly or was purchased from an untrusted source, unplug it from your network. Consider replacing it with a product from a reputable brand and a verified seller.

7. Keep your devices and apps updated: Install system and app updates regularly. Even though cheap devices may not always offer updates, keeping your software current reduces your risk. Choose brands that are known for providing reliable security patches.

Advertisement

8. Secure your router and home network: Your devices are only as safe as the network they’re connected to. Set a strong, unique password for your Wi-Fi router and update its firmware regularly. Disable remote access unless absolutely necessary and use WPA3 encryption if available. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

As BadBox 2.0 continues to evolve, protecting your entire home network, not just individual devices, has become essential to staying one step ahead of cybercriminals.

THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALL

Kurt’s key takeaway

It’s alarming how something as simple as a budget streaming box or projector could be quietly working for cybercriminals. As smart devices become part of almost everything we do, being a careful and informed consumer matters more than ever. Small steps like buying from trusted brands and avoiding unofficial downloads can make a big difference in keeping your home and personal data safe.

Advertisement

With over a million devices infected, who should be held accountable: manufacturers, governments or consumers? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Meta’s new AI video tool can put you in a desert (or at least try to)

Published

on

Meta’s new AI video tool can put you in a desert (or at least try to)

Meta is launching new video editing tools that will let you transform videos using AI. The tool, which is only free for a “limited time,” gives you more than 50 preset prompts you can use to edit your video, allowing you to set a theme, change the background, and tweak what you’re wearing.

The presets are presented similarly to how you would choose a filter on Instagram. You can have Meta AI restyle your clip as a video game or anime, make it appear as if it was taken in the desert, dress you in an AI-generated tuxedo, and more. The tool only works for the first 10 seconds of your video, though. It’s rolling out now in the US and “more than a dozen” countries in the Meta AI app, the Meta.AI website, and the Edits app.

I tried the feature out for myself, and my results certainly didn’t look as good as the examples posted on Meta’s website. I uploaded a video of my parents’ dogs digging a hole in the backyard, and asked Meta AI to make it look like they were in the desert. Meta AI turned the ground orange, put some (purple?) cacti in the foreground and background, and for some reason gave my dogs a shimmery glow. Then, when I asked it to restyle a video of myself as an anime character, Meta AI gave me fluorescent pink eyes and lips.

You can share the edited videos directly to Facebook and Instagram, or put them in the Discover feed in the Meta AI app. Though you can’t use custom prompts right now, Meta says “you’ll be able to edit videos alongside Meta AI with your own text prompts” later this year.

Continue Reading

Trending