FBI Ransomware, also known as Reveton Ransomware, is one of the latest menacing members of the giant Ransomware family. Upon infection, it restricts your access to files & applications on your mobile device & computers by encrypting them. It demands a ransom amount of around $100-$400 which is to be paid within 72 hour.
The FBI MoneyPak virus infection mainly propagates when you visit malware-laden sites that could instantly exploit vulnerabilities in the running browser of installed plug-ins.
|Operating System Impacted||Windows, iOS, Android|
|Targeted Browser||Google Chrome, Internet Explorer, Mozilla Firefox, Safari|
FBI Ukash MoneyPak Ransomware, nicknamed as FBI Ransomware, is rogue software that encrypts files & applications on smart-phones & computer systems.
FBI virus first surfaced to the limelight in year 2012 wherein it claimed to be associated with the domestic intelligence & security service of the United States, FBI (Federal Bureau of Investigation). It mentioned that a mobile device or computer has been locked as certain illicit activities were observed on the particular machine. A ransom amount from $100 to $400 was demanded by the victims, in order to get their encrypted data retrieved.
According to the resources, in response to the Ransomware attack, FBI published an advice, requesting people not to pay any ransom amount as the data encryption was not carried out by the real FBI. Ransomware Victims were asked to contact authorized PC security organizations such as Internet Crime Complaint Centre to get the Ransomware removed.
In year 2018, FBI worked in collaboration with the United Kingdom’s National Crime Agency & arrested a large number of hackers involved in developing & distributing the FBI ransom virus in the United States.
Though FBI Ransomware was first discovered in year 2012, after 6 complete years it has been observed propagating widely than ever. It is currently posing a serious threat to Windows OS, iOS & Android users across the globe.
It can infect your system/smart-phone when you visit malware-laden or corrupt sites, open spam e-mail attachments or download files from certain torrent sites.
Once your device has been infected, a screen-locker locks the mobile screen/desktop & a splash screen containing FBI’s Official Logo & a warning message appears.
The alert message/notice/warning claims that the devices have been blocked by the FBI due to the violation of certain Copyright & Related Rights Law. It further notifies the victims that copyrighted content such as videos, music & software has been illegally visited or distributed through the device.
The cyber-criminals behind this devious Ransomware ask the victims to pay the ransom amount from $100-$400 via Green Dot MoneyPak, Ukash or PaySafeCard pre-paid card services, in order to unblock their devices.
As per the warning, the ransom amount is to be paid in next 72 hours of the infringement. Failing to make the payment within 72 hours will lead to the registration of a criminal case against the victim.
Surprisingly, the right-side section of the Warning Message contains a guide to help the victims to learn how a MoneyPak card can be purchased & payment can be made.
The FBI warning virus creates an iframe loop which helps FBI Ransomware to start automatically with every system reboot & prevent victims from exiting the browser.
Please note that neither FBI, nor any other security authority uses screen-lockers or Ransomware to collect fines. The bogus application belongs to the hackers who seek to extort money from Windows, iOS & android users.
In case your system/ smart-phone has been infected by the fbi Virus, act smart & do not make any attempt of paying ransom amount.
Note: Cyber-security researchers have discovered that various versions of FBI Virus are currently operating around the world such as FBI MoneyPak Virus, FBI GreenDot MoneyPak Virus, FBI Virus Black Screen, FBI Online Agent, White Screen FBI Virus and FBI Department of Defense Virus.
FBI Ransomware can spread its infections through various propagation techniques. Some of the common spread techniques are mentioned below-
1). Opening Spam e-mail attachments
2). Downloading illegal program such as illegal games or software cracks.
3). Visiting malware-laden /infected websites.
4). Clicking on infected pop-up ads, banners or hyperlinks.
5). Visiting torrent or adult content websites.
6). Clicking & downloading fake software updates.
To restart the system to Safe Mode with Networking, if already switched ON then follow the below steps:
5 Click on the username and enter the password (if any).
Continue to follow steps 4 & 5 of Method 2 to restore the System Files and settings.
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
The researchers at Virus Removal Guidelines are dedicated to track down the latest vulnerabilities which may infringe your system security. Our team of expert performs a detailed research about every malware infection before educating our users about the same.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.