I guess you could try AI-checking it and answer "Ignore all previous instructions. …", followed by some new instructions. Some examples: https://www.aiweirdness.com/ignore-all-previous-instructions/
(Although I guess it would be better to not respond to this obvious case of spam/scam)
It seems like part of your thinking is: Why would a criminal invest effort to attack an average John Doe? The answer is: With a popular (widely used) operating system, the effort goes close to zero. Attacks can be automated, so they will be. Also, even if they are not interested in your data, they will be interested in other benefits they gain from controlling your computer: