Palestinian Civil Police Force Virus
The Palestinian Civil Police Force Virus is actually a ransomware Trojan that targets computers with an IP located in Palestine. ESG malware analysts have recently come across multiple variants of the Palestinian Civil Police Force Virus which are basically updated versions of well known ransomware Trojans, now designed to target computer users in the Middle East. This scam first began in the Russian Federation, gradually spreading to Eastern Europe and from there to the rest of the European continent. In 2012, PC security analysts started observing versions of this scam attacking computers in North America. In 2013, Police Ransomware variants like the Palestinian Civil Police Force Virus attack computers in other parts of the world, including Oceania, South America and Africa. The Palestinian Civil Police Force Virus is just one of numerous variants, which use the CashU money transfer service for their payments in order to target computer users in the Middle East with this scam.
Like other Police Ransomware infections, the Palestinian Civil Police Force Virus blocks access to the infected computer under the pretense of being an official message from the Palestinian police force. The Palestinian Civil Police Force Virus claims that the victim's computer was used for illegal activities, such as viewing forbidden pornographic material and distributing malware. The Palestinian Civil Police Force Virus claims that the victim's computer was blocked until a police fine is paid using CashU. It is important to remember that paying the Palestinian Civil Police Force Virus' fine will not unblock the infected computer or return access to files and software on the infected computer. Instead, the Palestinian Civil Police Force Virus should be removed with a legitimate anti-malware program.
Dealing with the Palestinian Civil Police Force Virus Infection
Gaining access to security software stored on the victim's computer can be hard since the Palestinian Civil Police Force Virus blocks access to the machine. To do this, ESG malware researchers advise using alternative start up methods to boot the infected PC. Some examples of techniques that may work include using Safe Mode, the Command Prompt to access the Windows Registry or an external boot source such as a USB memory drive or a CD to gain access to Windows and bypass the Palestinian Civil Police Force Virus message.
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.