Threat Database Trojans Trojan.Icepol

Trojan.Icepol

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 11
First Seen: April 5, 2013
Last Seen: November 23, 2021
OS(es) Affected: Windows

Trojan.Icepol is one of the Trojans responsible for Police Ransomware attacks that have been most active in 2013. The criminals responsible for Trojan.Icepol have released multiple versions in 2013, releasing new versions of this threat at a very rapid pace in an attempt to stay ahead of anti-malware software and malware analysts. Fortunately, anti-malware programs have managed to keep track of all new versions of Trojan.Icepol, meaning that computer users with a strong anti-malware application that is updated regularly should be well protected from Trojan.Icepol and similar threats. Trojan.Icepol and its ilk are all severe threats to computers. The high effectiveness of Police Ransomware Trojans like Trojan.Icepol as a tool for monetization of malware has made them one of the most prevalent malware threats active today.

The Trojan.Icepol Trojan carries out the Police Ransomware scam, one of the most common ways of fooling inexperienced computer users into parting with their money. Typically, the Trojan.Icepol scam has several steps:

  1. Trojan.Icepol enters a computer without the computer user's knowledge. There are several ways in which Trojan.Icepol can do this. These include being downloaded by the computer user (often because Trojan.Icepol has been disguised as a harmless file or email attachment) and being installed on the infected computer by taking advantage of known vulnerabilities in software by using an exploit kit.
  2. Once Trojan.Icepol is installed on the victim's computer, Trojan.Icepol will hitch on an outside server and download components designed to target the computer's geographical location. Trojan.Icepol will determine where the infected computer is located by analyzing its IP address and other network information.
  3. When the computer user attempts to log into Windows, Trojan.Icepol blocks all access to the compromised computer. The computer user will be greeted by a full screen message alleging that the compromised computer was obstructed by their country's police. Thanks to 'step 2', Trojan.Icepol will display a ransom message that is written in the victim's language and that references the police department of the affected computer's country. Trojan.Icepol is capable of blocking access to the Windows Desktop, Start Menu, Task Manager, files and applications, effectively taking the infected computer hostage.
  4. The Trojan.Icepol message will claim that the victim needs to pay a fine through a money transfer service in order to avoid jail time. However, paying this fine will not unblock that infected computer or do anything to remove Trojan.Icepol.

Trending

Most Viewed

Loading...