Police Ransomware Virus

Police Ransomware Virus Description

Police Ransomware infections are Winlocker Trojans that prey on inexperienced PC users by displaying a message that makes it look like they are being pursued by the police because they have viewed illegal pornography or dealt with copyrighted material. There has been a large resurgence of these scams due to their capacity to allow criminal groups to generate millions of euros. Police Ransomware infections have been a particularly insidious problem in Europe and, starting in 2012, this threat has steadily spread throughout the world. As of 2013, Police Ransomware variants have spread out as far as Argentina and Australia when only a couple of years ago this scam was relatively confined to Eastern Europe.

The Police Ransomware scam is not difficult to understand. These kinds of Trojans display a full screen window that accuses the victim of breaking the law. This message will usually contain logos and language from the victim's local police agency to lend credence to its threatening message. Unfortunately for the victim, this message will usually be accompanied with a Winlocker component that freezes the infected computer and prevents the victim from closing or bypassing the Police Ransomware message to obtain access to the compromised machine's Desktop or files. The main goal of the threatening message is to convince the victim to pay a ransom of a few hundred Euros or dollars through Ukash, MoneyPak or a number of other money transfer services. Some typical characteristics of Police Ransomware infections is that they display a message written in the victim's country's language and and containing logos and language from the local police force.

The Most Common Police Ransomware Families

Due to the similarity between different variants of the Police Ransomware scam, the line between Police Ransomware families is blurry and difficult to determine. This is further complicated by the fact that many of these infections use the same tactics and code to block the victim's computer. The following are some of the most common Police Ransomware families:

  • The Gimemo family of Police Ransomware appeared in 2010 and infected computer systems in Russia. The earliest variants demanded payment through text messaging but switched to PaySafeCard and Ukash later on. Police Ransomware in the Gimemo family tend to use messages from societies for copyright enforcement such as the United Kingdom's PRS or France's SACEM.
  • The Reveton family of malware is one of the most popular Police Ransomware variants. Also known as Matsnu and Rannoh, these malware threats started incorporating other components into the scam, such as using the victim's web cam to take a picture that would supposedly be sent to the police.
  • Urausy Police Ransomware Trojans are some of the most recent entries in these attacks and are responsible for Police Ransomware scams that have spread throughout North and South America since April of 2012.

Infected with Police Ransomware Virus? Scan Your PC for Free

Download SpyHunter's Spyware Scanner
to Detect Police Ransomware Virus
* SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.

If you still can't install SpyHunter? View other possible causes of installation issues.

Site Disclaimer

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.

IMPORTANT! To be able to proceed, you need to solve the following simple math.
Please leave these two fields as is:
What is 8 + 6 ?