Trojan.Icepol
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 11 |
First Seen: | April 5, 2013 |
Last Seen: | November 23, 2021 |
OS(es) Affected: | Windows |
Trojan.Icepol is one of the Trojans responsible for Police Ransomware attacks that have been most active in 2013. The criminals responsible for Trojan.Icepol have released multiple versions in 2013, releasing new versions of this threat at a very rapid pace in an attempt to stay ahead of anti-malware software and malware analysts. Fortunately, anti-malware programs have managed to keep track of all new versions of Trojan.Icepol, meaning that computer users with a strong anti-malware application that is updated regularly should be well protected from Trojan.Icepol and similar threats. Trojan.Icepol and its ilk are all severe threats to computers. The high effectiveness of Police Ransomware Trojans like Trojan.Icepol as a tool for monetization of malware has made them one of the most prevalent malware threats active today.
The Trojan.Icepol Trojan carries out the Police Ransomware scam, one of the most common ways of fooling inexperienced computer users into parting with their money. Typically, the Trojan.Icepol scam has several steps:
- Trojan.Icepol enters a computer without the computer user's knowledge. There are several ways in which Trojan.Icepol can do this. These include being downloaded by the computer user (often because Trojan.Icepol has been disguised as a harmless file or email attachment) and being installed on the infected computer by taking advantage of known vulnerabilities in software by using an exploit kit.
- Once Trojan.Icepol is installed on the victim's computer, Trojan.Icepol will hitch on an outside server and download components designed to target the computer's geographical location. Trojan.Icepol will determine where the infected computer is located by analyzing its IP address and other network information.
- When the computer user attempts to log into Windows, Trojan.Icepol blocks all access to the compromised computer. The computer user will be greeted by a full screen message alleging that the compromised computer was obstructed by their country's police. Thanks to 'step 2', Trojan.Icepol will display a ransom message that is written in the victim's language and that references the police department of the affected computer's country. Trojan.Icepol is capable of blocking access to the Windows Desktop, Start Menu, Task Manager, files and applications, effectively taking the infected computer hostage.
- The Trojan.Icepol message will claim that the victim needs to pay a fine through a money transfer service in order to avoid jail time. However, paying this fine will not unblock that infected computer or do anything to remove Trojan.Icepol.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.