Spamhaus Ransomware

Spamhaus Ransomware Description

Type: Adware

ScreenshotThe Spamhaus Ransomware Trojan is a malware infection that has been responsible for various recent attacks. The Spamhaus Ransomware uses a fake warning from Spamhaus, a legitimate organization that tracks spam distributors and works with law enforcement agencies to prosecute spammers around the world. While the legitimate Spamhaus organization is located in Switzerland and provides a valuable service, the Spamhaus Ransomware is actually a malware threat that sullies this organization's good name by using it as part of its scam. Spamhaus is an important organization dedicated to stopping spam and the malware that often comes as a consequence of these kinds of scams.

The Spamhaus Ransomware message is part of one of these kinds of scams which carries out a typical version of the well known Police Ransomware infection. It is important to note that the Spamhaus Ransomware has no actual connection with Spamhaus and that using the brands of popular anti-virus programs or legitimate law enforcement or anti-spam organizations is a common tactic criminals use to carry out their malware attacks. To bypass the Spamhaus Ransomware message, ESG security researchers advise the use of an alternate start-up method, for example, using Safe Mode or a removable memory device to start up the infected computer.

What is the Goal of the Spamhaus Ransomware Error Message?

Claiming to be version 2.0.8 of the Spamhaus online agent, the Spamhaus Ransomware claims that the victim has 48 hours to make the payment of a fine because the infected computer is being used to distribute malware such as worms, Trojans and viruses. The Spamhaus Ransomware also makes the bogus claim that all files on the victim's computer were blocked and encrypted. This is actually a false claim. The Spamhaus Ransomware isn't capable of encrypting or blocking files. Rather, the Spamhaus Ransomware alters the Windows Registry which prevents the computer user from bypassing the Spamhaus Ransomware message and having access to the computer's Desktop. The files are intact and have not been encrypted in any way. Because of this, it isn't necessary to pay the Spamhaus Ransomware fine. It is simply a matter of bypassing the Spamhaus Ransomware message in order to gain access to security software on the infected computer. In fact, paying this 'penalty' will do zero to remove the Spamhaus Ransomware or allow you to recover control over your computer.Screenshot

Technical Information

More Details on Spamhaus Ransomware

The following messages associated with Spamhaus Ransomware were found:
Spamhaus online agent v. 2.0.8
The Spamhaus project
Working to Protect Networks Wordwide
You have 48 hours left to enter your payment.
You have lost control over your computer. Your system and all your files has been blocked and encrypted because you were spreading the Malware (viruses, Trojans, worms). You are breaking numerous International and USA laws.

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

One Comment

  • Sterling Edwards:

    Spamhaus virus observed 4/15/2013. Infection consisted of 3 files
    1. SVCHOST.EXE locating in C:\Windows (instead of in SYSTEM32)
    2. WININIT.INI in C:\Windows
    3. Folder "\Team Lead" with file WDSCORE.EXE in the APPDATA\LOCAL

    All personal files (i.e. .DOC .JPG .XLS) were appended with .HTML suffix, and all these files were encrypted. Renaming and removing the .HTML suffix was pointless, the encrypted files could not be read by Microsoft WORD or Picture Viewer etc. The user effectively lost all his personal data! Sickening. No known antidote.