Remove “computer locked, data encrypted” virus (FBI – ICSPA Scam) Ransomware

If your computer is locked, and you are seeing a “WARNING! Your computer has been locked and all your data were encrypted” notification from FBI Cybercrime Division and International Cyber Security Protection Alliance, then your computer is infected with a piece of malware known as Trojan Reveton.
[Image: FBI Cybercrime Division: Computer locked, data encrypted virus]
The FBI “Your computer has been locked and all your data were encrypted” virus is distributed through several means. Malicious websites, or legitimate websites that have been compromised, may drop this trojan onto a compromised computer. This drive-by-download often happens surreptitiously. Another method used to propagate this type of malware is spam email containing infected attachments or links to malicious websites. The threat may also be downloaded manually by tricking the user into thinking they are installing a useful piece of software.
The FBI “Your computer has been locked and all your data were encrypted” virus is also prevalent on peer-to-peer file sharing websites and is often packaged with pirated or illegally acquired software.
Once installed on your computer, the “Your computer has been locked and all your data were encrypted” virus will display a bogus notification that pretends to be from FBI Cybercrime Division and ICSPA, and states that your computer has been blocked due to it being involved with the distribution of pornographic material, SPAM and copyrighted content.
The “Your computer has been locked and all your data were encrypted” virus will lock you out of your computer and applications, so whenever you’ll try to log on into your Windows operating system or Safe Mode with Networking, it will display instead a lock screen asking you to pay a non-existing fine of €200 or $200 in the form of a Ukash, MoneyPak or Paysafecard voucher depending on your location.
Furthermore, to make this alert seem more authentic, this virus also has the ability to access your installed webcam, so that the bogus “Your computer has been locked and all your data were encrypted” notification shows what is happening in the room.
The FBI Cybercrime Division “Your computer has been locked and all your data were encrypted” virus locks the computer and depending on the user’s current location, displays a localized webpage that covers the entire desktop of the infected computer and demands payment for the supposed possession of illicit material.

[Image: FBI: Your computer has been locked and all your files were encrypted virus]
[Image: Your computer has been blocked and all your files were encrypted virus]
[Image: ICSPA: Your computer has been locked and all your files were encrypted virus]

Cyber criminals often updated the design of this lock screen, however you should always keep in mind that FBI Cybercrime Division and International Cyber Security Protection Alliance will never lock down your computer or monitor your online activities.The message displayed by the threat can be localized depending on the user’s location, with text written in the appropriate language.
FBI Cybercrime Division
International Cyber Security Protection Alliance
WARNING! Your computer has been locked and all your data were encrypted
Reason: violation of Law.
Possible violations are described below:
Title 17- COPYRIGHTS
Chapter 10, Subchapter B – COPYING CONTROLS
(a) Prohibition on Importation, Manufacture, and Distribution.— No person shall import, manufacture, or distribute any digital audio recording device or digital audio interface device that does not conform to—
(1) the Serial Copy Management System;
(2) a system that has the same functional characteristics as the Serial Copy Management System and requires that copyright and generation status information be accurately sent, received, and acted upon between devices using the system’s method of serial copying regulation and devices using the Serial Copy Management System; or
(3) any other system certified by the Secretary of Commerce as prohibiting unauthorised serial copying.
Title 18 – CRIMES AND CRIMINAL PROCEDURE Title 18, Part I Chapter 117 § 2427
Inclusion of offences relating to child pornography in definition of sexual activity for which any person can be charged with a criminal offence.
Title 18 Part I Chapter 110, § 2258C Inclusion of offences relating to child pornography in definition of sexual activity for which any person can be charged with a criminal offence.
a) Elements.—
(1) In general— The National Center for Missing and Exploited Children may provide elements relating to any apparent child pornography image of an identified child to an electronic communication service provider or a remote computing service provider for the sole and exclusive purpose of permitting that electronic communication service provider or remote computing service provider to stop the further transmission of images.
(2) Inclusions.— The elements authorised under paragraph (1) may include hash values or other unique identifiers associated with a specific image, Internet location of images, and other technological elements that can be used to identify and stop the transmission of child pornography.
(3) Exclusion— The elements authorised under paragraph (1) may not include the actual images.
(b) Use by Electronic Communication Service Providers and Remote Computing Service Providers.— Any electronic communication service provider or remote computing service provider that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under this section may use such information only for the purposes described in this section, provided that such use shall not relieve that electronic communication service provider or remote computing service provider from its reporting obligations under section 2258A.
(c) Limitations.— Nothing in subsections [1] (a) or (b) requires electronic communication service providers or remote computing service providers receiving elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children to use the elements to stop the further transmission of the images.
(d) Provision of Elements to Law Enforcement.— The National Center for Missing and Exploited Children shall make available to Federal. State, and local law enforcement involved in the investigation of child pornography crimes elements, including hash values, relating to any apparent child pornography image of an identified child reported to the National Center for Missing and Exploited Children.
(e) Use by Law Enforcement.— Any Federal, State, or local law enforcement agency that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under section [1] (d) may use such elements only in the performance of the official duties of that agency to investigate child pornography crimes.
Title 18 Part I Chapter 110 § 22524
§ 2252A – Certain activities relating to material constituting or containing child pornography
Title 26 Subtitle F Chapter 78 > Subchapter A § 7612 Special procedures for summonses for computer software
To unlock your computer you must pay a penalty within 24 hours and input voucher axle to a form below. It will take up to 24 hours to check voucher code and decrypt your data.
The “Your computer has been locked and all your data were encrypted” lock screen is a scam, and you should ignore any alerts that this malicious software might generate.
Under no circumstance should you send any Ukash or Paysafecard code to these cyber criminals, and if you have, you can  should request a refund, stating that you are the victim of a computer virus and scam.

News article is edited by: yakura - 13-04-2018, 15:18

Comments 4

Hurain
Hurain 6 October 2018 01:56
通常,在周末期间,当我写一些https://haoessays.wordpress.com/时,我发现myslef渴望这类食物,我真诚地喜欢这样的人。
Kims
Kims 20 November 2018 15:36
I am going to introduce myself in the way you have done. Future blase
James Vie
James Vie 16 December 2018 14:44
Tech has also completed it thinkable for students to progress their education skills. Students have now using https://www.topratedessayservice.com/rushessay-com-review/ and projectors for their current work in the class instead of using the formal method of black boards to write on there.
sdsd
sdsd 16 May 2019 10:36
La combinaison de l'émail fabriqué à la main et de l'émail exquis bleu nuit met les gens à l'aise, et chaque détail montre le savoir-faire de la marque, pleine de brillance sous un éclairage différent. La longue échelle de temps est spécialement conçue pour le nouveau modèle, avec un pointeur de style prince. La position 12 heures est l'indication de la date et la position 6 heures est un beau tourbillon, qui tourne avec précision sur le cadran pour enregistrer le passage du temps. La petite trotteuse en forme de flèche tourne sur le tourbillon pendant une semaine en indiquant 60 chiffres en séquence. La chopard montres est associée à un bracelet en alligator bleu qui complète le cadran bleu.

Add comment

Add comment

reload, if the code cannot be seen