THREAT REMOVAL

Remove Amazon Phishing Scams — How to Identify Them and Protect Yourself

This article has been created in order to explain to you what is the Amazon Phishing Scams and how you can remove them as well as all potentially unwanted programs delivered through them.

The Amazon Phishing Scams are a set of email phishing campaigns that attempt to manipulate that targets into interacting with malicious scripts. At the moment we do not have information about the perpetrators behind it. Our article gives an in-depth explanation of how it propagates and how victims can attempt to remove active infections.

Threat Summary

NameAmazon Phishing Scams
TypePhishing email scam
Short DescriptionThe Amazon Phishing Scams is a recent example of the scam tactic that extorts the targets into interacting with a scam site.
SymptomsVictims will receive email messages that contain the phishing instructions.
Distribution MethodPhishing emails.
Detection Tool See If Your System Has Been Affected by malware

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Amazon Phishing Scams.

Amazon Phishing Scams — July 2020 Disabled Account Message

July 2020 saw the sending out of several new Amazon-themed phishing campaigns. This is midst the COVID-19 crisis which has shifted many Internet users into relying much more on e Commerce sites such as Amazon. Due to their rise in popularity computer hackers are now sending out more and more email messages that contain spam and fake messages that are designed to look like official Amazon notifications. There have been three independent campaigns which include different signatures showing that separate hacking groups are behind them:

  • Domain Spoofing Campaign — The first campaign lists email messages that are sent out by third-party vendors that appear to have been hijacked. A part of these messages may also be spoofed according to the security analysis. The posted in links contain legitimate and authentic links to vendors accounts which has allowed the messages to pass through the firewalls and virus scanners. The messages appear as order cancellation messages. A phishing button reading update Amazon billing information will lead to a login page that will request the credentials of the recipients.
  • Amazon Delivery Order Phishing Campaign — The second email phishing campaign includes fake communications that appears to be sent by Amazon. This notification lists a phone number linking it to a team called Fraud Protection Team — the recipients will be lead to call the number. This will initiate a fake tech support phone scam which will use manipulate the users to give in their account data.
  • Shipped Amazon Order Notification — Another email scam which has been capture by the hackers uses a Gmail inbox in order to impersonate Amazon. It includes dangerous links to fake login prompts.

Amazon Phishing Scams — March 2020 Disabled Account Message

In March 2020 a new ongoing Amazon phishing scam has been detected. This time the hackers are attempting to impersonate the online retailer. The scammers are sending in email phishing messages and site notifications which will lure in the victims into thinking that their accounts are to be closed. The manipulation will be based on a fake message that states that inactive accounts are to be removed by the company. The hackers will cite a non-existing terms and conditions clause. The users will be manipulated into opening a shortened link which will lead to a fake login page where user accounts will be hijacked. When the users enter in their data it will be automatically transmitted to the hackers.

According to the scam messages accounts which are to be disabled will lead to the following behavior:

  • The user will not be able to purchase products from Amazon or partners
  • The user will not be able to sell or advertise their products on Amazon
  • The user will not be able to create or use another account in his name
  • All product shipments will be canceled

Amazon Phishing Scams – Distribution Ways

Amazon phishing scams can be obtained from various sources. One of the most common ones are the use of email SPAM messages that are sent according to a list of target recipients. The emails will be designed to look like actual notifications sent by the company. This is done by using several techniques, among them the main one relies on the use of the same design and layout as the real Amazon notification messages. The hackers will hijack the design elements consisting of both images, background and content. In addition the criminals behind the ongoing attacks will use similar sounding domain names to Amazon or their services. Together with fake (or legitimate) security certificates the users may be manipulated into interacting with these pages. In some of the cases the users may be redirected to real or fake login pages.

Various Amazon phishing scams can also be delivered via infected payloads of which there are two popular types:

  • Software Setup Files — The criminals can produce malicious installers of popular applications. Usual victims are software that are commonly installed by end users: creativity suites, productivity apps and system utilities. Whenever the installers are engaged during setup or when the process is complete the scam page will be produced — either in a browser, application frame or pop-up window.
  • Malware Documents — Various infections, including those with phishing scams, can be caused by interacting with virus-infected documents. They can be of any of the popular types: rich text documents, spreadsheets, presentations and databases. Once they are opened by the victims a notification will be spawned asking the users to enable the built-in code. If this is done then the virus infections will be started.

In some occasions the scam messages can also be presented in the end of the malicious web browser plugins. They are usually made compatible with the most popular web browsers and are distributed both on the relevant repositories, as well as other sites, communities, chat rooms and etc. The relevant web browser plugins are uploaded with fake user and developer credentials featuring elaborate descriptions with promises of added functionality and performance enhancements. Once they are installed the built-in behavior code pattern will be started. Most of the dangerous strains will change the default options of the web browsers to redirect the users to a hacker-controlled page by changing the most freqently used settings — default home page, new tabs page and search engine. In this case this can various Amazon phishing scam pages.

Amazon Phishing Scams – In-Depth Overview

The Amazon Phishing scams can have various effects upon the victim machines. Their primary goal is to coerce the recipients into thinking that they have received a legitimate message from the e-commerce site or any of their services. Each attack campaign may be operated by a different hacker collective or individual criminal. Phishing scams are one of the most common Internet crimes that continue to be an effective way to trick computer users worldwide.

Interaction with them may lead to virus infections as they often contain malicious scripts or links to hacker-controlled sites. This is especially true when the criminals attach or send links to files. There are three primary types of data that are observed with such scam emails:

  • Direct Virus Files —Actual virus files of different types can be attached to the email messages.
  • Malicious Documents — The Amazon Phishing scams can serve as a conduit for documents containing malicious elements. They can be of any of the popular file types: presentations, spreadsheets, rich text documents and databases. Whenever they are opened a notification box will appear asking them to enable the built-in code. Whenever this is done the included payload will be deployed and started.
  • Infected Software Installers — The email messages can include body contents that include setup files of ofen used applications. Examples include system utilities, productivity applications and creativity suites. Whenever they are installed the malicious payload will also be placed on the victim computer.

If the email clients display the interactive elements then additional threats can be embedded in the messages. An example is the inclusion of cryptocurrency miners that can be found even within JavaScript code. When they are started the built-in code will take advantage of the available system resources to execute complex calculations. When the completed tasks are reported the operators will receive digital currency in the form of a cryptocurrency. Their wallets will automatically be credited with the amount equal to the work done.

Another dangerous threat connected with Amazon phishing scams is that they can link the victim recipients into fake login pages. They are designed to fool them into thinking that they are entering their account credentials to the legitimate service. Instead their account credentials will automatically be hijacked and sent to the respective hacker operators.

Related Story: $1000 Amazon Gift Card Scam – How to Get Rid of It?

Some of the phishing scams can also display intrusive ads taking various forms — pop-ups, banners and in-line links. In most cases they are sponsor-related and will pay the hacker operators a certain fee when a pre-agreed number of clicks are generated.

Another instance that relies heavily on scripts execution is the deployment of tracking cookies and/or a data collection module. They can both harvest sensitive data that can be categorized into two main groups:

  • Personal Information — The tracking cookies and associated scripts can expose the identity of the users by looking for strings such as their name, address, phone number, interests, location and any stored username and password combinations.
  • System Data — A report of the installed hardware components can be generated and sent to the hacker operators. Other data that can be part of this collection of information includes user settings and operating system values.

WARNING! In certain cases the scripts can also lead to Trojan infections — viruses that establish a secure connection to a hacker-controlled server. This allows the operators to spy on the users in real time, deploy various threats and take over control of the victim machines at any given time. This also allows them to hijack any file available on them. The other possibility is to deploy a ransomware virus which will encrypt target user data according to a built-in list of target file type extensions.

Amazon Phishing Scams — Amazon Email Gift Scam

A wave of phishing email messages have been reported to carry Amazon related scams. The victims will receive them with the subject line “Outline of our recent discussion”. They will explain the recipients that they have been chosen to receive a gift from Amazon. The explanation will be that this is after a giveaway which was completed shortly before the message has been sent. More information is to be disclosed when clicking on the page that also contains the redeem instructions. A long URL is presented in the email message and contains strings like “safe”, “protection” and “outlook” all of which refer to legitimate contents.

The recipients will be explained that they need to enter in their contact information in order to receive the gift. The redirect link will request a lot of personal information, including the account credentials from their Amazon profiles and possibly even payment card information.

Amazon Phishing Scams — Order Confirmation

This is an alternative order confirmation page phishing scam which is being distributed in targeted email campaigns against users worldwide. Using email redirects it can even land in the inbox of the users are not be registered as SPAM at all. Its body contents copies Amazon even in fine details which makes it very hard to differentiate between the scam messages and real notifications that are sent by the company. Some of the captured scam samples utilize personalized openings which shows that the hackers behind the attacks have obtained information on the victims. This can greatly increase the number of infected users.

There are several elements in the email messages that refer to order details and information:

  • Estimated Delivery Date
  • Shipping Method
  • Payment Summary

If the criminals spoof the order details information then a very convincing phishing attack can be planned. The main link into which the victims are guided to (Order Details) will redirect the users to a fake login page.

Remove Amazon Phishing Scams — Amazon Please Respond Emails

Many computer users have received phishing email messages that imitate Amazon notifications. Instead of the legitimate domain of the online service the messages originate from an unknown address hosted on Hotmail which is surely a sign that it is fake.

The scam tactics will offer the recipients participation in a survey regarding a purchase with Amazon. They are promised a lucrative reward for providing the requested feedback. The message will quote details about the fake order by specifying an order ID, email delivery and estimated delivery. Such promises should be disregarded as soon as they are received, most online merchants do not engage in such promotions or offers.

The messages are easy to identify and categorize as scam by looking out for this section:

We are not affiliated nor partnered with Amazon. Amazon has not authorized, participated it, or in any way reviewed this advertisement or authorized it.
To be removed please Unsubscribe here or write to
PO box 971, Reno NV 89504

This is marketing email, 1401 Lavaca Street #107, Austin, TX 78701

Amazon.com

From the body contents it is evident that the source of the message is a marketing agency that has harvested the credentials of the recipients. It is possible that the data has also been extracted from other sources such as browser hijackers, leaked databases or even tables with data from the underground markets.

Amazon Phishing Scams — Prime Membership

A newly published security report shows a new kind of Amazon phishing scam wherein the victims will receive an email message that will be masked as being sent by the company itself. Their body contents will be designed using the typical Amazon web elements. The recipient’s email address will be placed in the beginning with bold text which may confuse them into thinking that this is personalized. Amazon messages will use the person’s real name and other related elements and other information that are disclosed during user registration. However in some cases their email can be cross-linked to public records or databases obtained through the hacker underground markets.

The body contents of the messages will falsely display a notification that a Prime membership was purchased for a long period (6 or 12 months) and that they can cancel the automatic renewal by visiting a certain site.

If they click on the link the users will be redirected to a fake login page. If their account credentials are entered they will automatically be transferred to the hacker operators of the scam. As a result the hijacked information can be used for crimes like blackmail, identity abuse, financial theft and etc.

Amazon Phishing Scams — Amazon Order Confirmation Email

The victim users may receive email messages claiming to be from Amazon. In fact they are phishing attempts that utilize domain names that are not affiliated with the company. At the same time they use links and design layout which may be confused with the real company.

The message will read that the recipient’s Amazon account was used to buy a $250 Gift Card from a device that was not previously associated with the merchant. They are coerced to verify or block the transaction by clicking on a text link. This action will redirect the users to a fake login page which will request the account credentials of the quoted Amazon account.

Amazon Phishing Scams — Amazon Shopping Experience Reward

This scam strategy is a recent example of a phishing tactic that relies on sending out email messages that are designed to appear as being sent by Amazon. The emails are designed as being a shopper survey page that is non-personalized and appears to be sent by the company. It asks the users to rate their recent shopping experience by selecting one of the following options: very satisfied, satisfied, neutral, dissatisfied and very dissatisfied. When one of these options is selected the victims will be redirected to a phishing login page that will request their Amazon account credentials.

Some of the warning signs of a potential phishing email scam message are the following:

  • The top-right screen will show “Amazon Shopper” instead of the customer’s real name as registered in the company’s records.
  • The showing of a fake or randomly-generated account number that does not correlate with the real one assigned to the users.
  • Promo survey links, if sent at all, will not lead to login pages.
  • The company address and name will be to Amazon and not to other companies.

Amazon Phishing Scams — Order Notification

The malicious actors behind the Amazon phishing scams have developed another scam tactic which coerces the recipients into thinking that they have made an order with Amazon. Legitimate-looking images, overall layout and design elements are used with these messages which leads to a higher chance of infecting users.

The sent email messages will include a link allowing the users to verify their order, if it is interacted with it will cause a malicious activity. There are two popular cases which represent the majority of incidents:

  • Link To Hacker-Controlled Page — Clicking on the link can redirect the victim users to a phishing login page which will request their Amazon account credentials.
  • Malware Delivery — Clicking on the link may download a file or script that may be a virus or a payload delivery carrier. Interaction with it can lead to dangerous system infections.

Amazon Phishing Scams — Account Verification

Amazon phishing messages can also take the form of faux notifications that are sent in by the company’s “Assistance Center”. The recipients will receive emails that are designed using the usual layout that is expected to come from the company. The victims will be shown a message stating that their accounts will be locked. The reasons quoted are because the account is subject to policy violations. In order for this to be done the hackers instruct the recipients to login to their accounts and then click on a hyperlink where they will need to follow the instructions. There are several scenarios that can be used to lead to attacks:

  • Fake Login Prompts — The hackers can present faux login prompts that will hijack the account credentials that are entered inside.
  • Malware Redirect — The hyperlinks will lead to a malware site that can lead to other infections.
  • Virus Downloads — The links may lead to viruses of all common types.

Amazon Phishing Scams — Fake Amazon AWS Notifications

A new phishing campaign takes advantage of the fact that the computer criminals behind it have the ability to manipulate the email recipients into believing that they are receiving notifications from the Amazon AWS service. This is the industry giant’s cloud hosting infrastructure which is particularly popular among both home users and big companies.

What’s particularly dangerous about them is that the emails are designed to look just like the original notifications that have been sent by the company. They will state that the accounts of recipients are suspended due to a lack of payment. In order to fix this issue the users are proposed to click on an embedded hyperlink.

This can lead to different consequences. The most common one is the presentation of a login prompt, if the users enter in their account information then it will be sent to the hackers immediately. Another strategy used by hacking groups is the direct opening of a payment page which will directly request payment card details. In some cases the hackers can also redirect the visitors to a malware page. It can distribute viruses, show intrusive ads and lead to other type of dangerous behavior.

Remove Amazon Phishing Scams from Windows and Your Browser

If you want to remove the Amazon Phishing Scams from your computer, we strongly suggest that you follow the removal instructions posted underneath this article. They have been created with the main idea In mind to help you delete this virus either manually or automatically. Be advised that according to experts the best way to try and remove the software that is causing the Amazon Phishing Scamsming pop-ups is to use an advanced anti-malware software. Such program is created with the idea in mind to fully scan your computer and try to eliminate any traces of unwanted programs while protecting your computer against future infections as well.

Avatar

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus


Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer

How to Remove Amazon Phishing Scams from Windows.


Step 1: Boot Your PC In Safe Mode to isolate and remove Amazon Phishing Scams

OFFER

Manual Removal Usually Takes Time and You Risk Damaging Your Files If Not Careful!
We Recommend To Scan Your PC with SpyHunter

Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter's EULA, Privacy Policy and Threat Assessment Criteria

1. Hold Windows key() + R


2. The "Run" Window will appear. In it, type "msconfig" and click OK.


3. Go to the "Boot" tab. There select "Safe Boot" and then click "Apply" and "OK".
Tip: Make sure to reverse those changes by unticking Safe Boot after that, because your system will always boot in Safe Boot from now on.


4. When prompted, click on "Restart" to go into Safe Mode.


5. You can recognise Safe Mode by the words written on the corners of your screen.


Step 2: Uninstall Amazon Phishing Scams and related software from Windows

Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:


1. Hold the Windows Logo Button and "R" on your keyboard. A Pop-up window will appear.


2. In the field type in "appwiz.cpl" and press ENTER.


3. This will open a window with all the programs installed on the PC. Select the program that you want to remove, and press "Uninstall"
Follow the instructions above and you will successfully uninstall most programs.


Step 3: Clean any registries, created by Amazon Phishing Scams on your computer.

The usually targeted registries of Windows machines are the following:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

You can access them by opening the Windows registry editor and deleting any values, created by Amazon Phishing Scams there. This can happen by following the steps underneath:

1. Open the Run Window again, type "regedit" and click OK.


2. When you open it, you can freely navigate to the Run and RunOnce keys, whose locations are shown above.


3. You can remove the value of the virus by right-clicking on it and removing it.
Tip: To find a virus-created value, you can right-click on it and click "Modify" to see which file it is set to run. If this is the virus file location, remove the value.

IMPORTANT!
Before starting "Step 4", please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Step 4: Scan for Amazon Phishing Scams with SpyHunter Anti-Malware Tool

1. Click on the "Download" button to proceed to SpyHunter's download page.


It is recommended to run a scan before purchasing the full version of the software to make sure that the current version of the malware can be detected by SpyHunter. Click on the corresponding links to check SpyHunter's EULA, Privacy Policy and Threat Assessment Criteria.


2. After you have installed SpyHunter, wait for it to update automatically.

SpyHunter5-update-2018


3. After the update process has finished, click on the 'Malware/PC Scan' tab. A new window will appear. Click on 'Start Scan'.

SpyHunter5-Free-Scan-2018


4. After SpyHunter has finished scanning your PC for any files of the associated threat and found them, you can try to get them removed automatically and permanently by clicking on the 'Next' button.

SpyHunter-5-Free-Scan-Next-2018

If any threats have been removed, it is highly recommended to restart your PC.


Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer

Get rid of Amazon Phishing Scams from Mac OS X.


Step 1: Uninstall Amazon Phishing Scams and remove related files and objects

OFFER
Manual Removal Usually Takes Time and You Risk Damaging Your Files If Not Careful!
We Recommend To Scan Your Mac with SpyHunter for Mac
Keep in mind, that SpyHunter for Mac needs to purchased to remove the malware threats. Click on the corresponding links to check SpyHunter’s EULA and Privacy Policy


1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:


2. Find Activity Monitor and double-click it:


3. In the Activity Monitor look for any suspicious processes, belonging or related to Amazon Phishing Scams:

Tip: To quit a process completely, choose the “Force Quit” option.


4. Click on the "Go" button again, but this time select Applications. Another way is with the ⇧+⌘+A buttons.


5. In the Applications menu, look for any suspicious app or an app with a name, similar or identical to Amazon Phishing Scams. If you find it, right-click on the app and select “Move to Trash”.


6: Select Accounts, after which click on the Login Items preference. Your Mac will then show you a list of items that start automatically when you log in. Look for any suspicious apps identical or similar to Amazon Phishing Scams. Check the app you want to stop from running automatically and then select on the Minus (“-“) icon to hide it.


7: Remove any left-over files that might be related to this threat manually by following the sub-steps below:

  • Go to Finder.
  • In the search bar type the name of the app that you want to remove.
  • Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
  • If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.

In case you cannot remove Amazon Phishing Scams via Step 1 above:

In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:

Disclaimer! If you are about to tamper with Library files on Mac, be sure to know the name of the virus file, because if you delete the wrong file, it may cause irreversible damage to your MacOS. Continue on your own responsibility!

1: Click on "Go" and Then "Go to Folder" as shown underneath:

2: Type in "/Library/LauchAgents/" and click Ok:

3: Delete all of the virus files that have similar or the same name as Amazon Phishing Scams. If you believe there is no such file, do not delete anything.

You can repeat the same procedure with the following other Library directories:

→ ~/Library/LaunchAgents
/Library/LaunchDaemons

Tip: ~ is there on purpose, because it leads to more LaunchAgents.


Step 2: Scan for and remove malware from your Mac

When you are facing problems on your Mac as a result of unwanted scripts, programs and malware, the recommended way of eliminating the threat is by using an anti-malware program. Combo Cleaner offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.



Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Remove Amazon Phishing Scams from Google Chrome.


Step 1: Start Google Chrome and open the drop menu


Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"


Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.


Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.


Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Erase Amazon Phishing Scams from Mozilla Firefox.

Step 1: Start Mozilla Firefox. Open the menu window


Step 2: Select the "Add-ons" icon from the menu.


Step 3: Select the unwanted extension and click "Remove"


Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.



Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Uninstall Amazon Phishing Scams from Microsoft Edge.


Step 1: Start Edge browser.


Step 2: Open the drop menu by clicking on the icon at the top right corner.


Step 3: From the drop menu select "Extensions".


Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.


Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.



Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Remove Amazon Phishing Scams from Safari.


Step 1: Start the Safari app.


Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.


Step 3: From the menu, click on "Preferences".

stf-safari preferences


Step 4: After that, select the 'Extensions' Tab.

stf-safari-extensions


Step 5: Click once on the extension you want to remove.


Step 6: Click 'Uninstall'.

stf-safari uninstall

A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the Amazon Phishing Scams will be removed.


How to Reset Safari
IMPORTANT: Before resetting Safari make sure you back up all your saved passwords within the browser in case you forget them.

Start Safari and then click on the gear leaver icon.

Click the Reset Safari button and you will reset the browser.


Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Eliminate Amazon Phishing Scams from Internet Explorer.


Step 1: Start Internet Explorer.


Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'


Step 3: In the 'Manage Add-ons' window.


Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.


Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.