Policia Nacional De Uruguay Virus
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 9,144 |
Threat Level: | 10 % (Normal) |
Infected Computers: | 91 |
First Seen: | March 13, 2013 |
Last Seen: | August 18, 2023 |
OS(es) Affected: | Windows |
The Policia Nacional de Uruguay Virus is a Police Ransomware Trojan designed to infect computers located in Uruguay. To carry out its attack, the Policia Nacional de Uruguay Virus ensures that the victim's computer is located in this country by looking at its IP address and system settings. If the infected computer fits the bill, then the Policia Nacional de Uruguay Virus variant is installed. Computers located in other countries will be infected with one of the countless other variants of these attacks corresponding to the infected computer's location. The Policia Nacional de Uruguay Virus attacks the victim with messages written in Spanish and uses Uruguay's flag and police associations in its ransom message. This is part of an attack designed to scam inexperienced computer users into believing that they are being prosecuted by their country's main police association.
The Policia Nacional de Uruguay Virus uses a Winlocker, a malicious component that blocks access to the infected computer by disabling a long list of programs and operating system components. This results in a computer that is locked down. When the victim tries to use the infected computer, a fake message from the Policia Nacional de Uruguay (Uruguay's national police) is displayed. This fake message claims that the infected computer was locked as part of a police operation due to its involvement in illegal activities. It goes on to frighten the victim with jail and fines of thousands of Pesos unless a fine of one hundred dollars or two thousand pesos is paid using Ukash. It is important to note that Ukash is a legitimate online payment service that is not associated with these scams. It is also worthwhile to mention that in no way the Policia Nacional de Uruguay Virus message is associated with the Uruguay's police and that it is part of a scam meant to steal computer users' money.
Preventing the Policia Nacional de Uruguay Virus Attacks
There are several steps you can take to prevent a Policia Nacional de Uruguay Virus infection on your computer. These include the following:
- Protect your computer with a strong anti-malware tool.
- Avoid opening email attachments that come from unsolicited sources.
- Avoid online content commonly associated with malware, such as torrent networks.
- Always download the latest security updates for your software and operating system.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.