‘Cyber Command of [State Name]’ Ransomware
Posted: October 16, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 4 |
First Seen: | October 16, 2013 |
---|---|
OS(es) Affected: | Windows |
The 'Cyber Command of [State Name]' Ransomware is a new branch of the Urausy family of fake Police Trojans, sticking to traditional desktop-blocking pop-up attacks that have been redesigned to specialize in specific regions of the United States. With New York, California and Texas all under attack from variants of the 'Cyber Command of [State Name]' Ransomware, protecting your PC from this new form of fake Police Trojan should continue to utilize reliable anti-malware protection and safe Internet behavior in conjunction. If you do see one of the 'Cyber Command of [State Name]' Ransomware's warning messages and ransom demands blocking your desktop, SpywareRemove.com malware researchers recommend using a safe bootup method to disable all PC threats, which will allow you to remove the 'Cyber Command of [State Name]' Ransomware with anti-malware software.
The 'Cyber Command of [State Name]' Ransomware: Taking Command of American Wallets, One State at a Time
The 'Cyber Command of [State Name]' Ransomware is a general term applied to one of the newest-emerging sub-variants of Urausy, a family of international Police Ransomware Trojans that deliver different warning messages for different nations. Since all known members of the 'Cyber Command of [State Name]' Ransomware specialize in different states of the US, the existence of the 'Cyber Command of [State Name]' Ransomware branch may be indicative of malware authors having a particular interest in compromising American PCs and finances. Some of the earliest samples that malware researchers have gotten a hold of include the 'Cyber Command of New York' Ransomware, the 'Cyber Command of South Texas' Ransomware, the 'USA Cyber Crime Investigations' Ransomware and the 'Cyber Command of California' Ransomware.
Members of the 'Cyber Command of [State Name]' Ransomware's sub-family are designed to display modified pop-ups as soon as Windows starts, with the pop-up windows being unable to be closed, resized, moved or minimized. The 'Cyber Command of [State Name]' Ransomware pop-ups use generic legal warnings to claim that your computer has been confirmed to be involved in various embarrassing online crimes, but the 'Cyber Command of [State Name]' Ransomware actually is installed without trying to confirm these accusations. As usual, the 'Cyber Command of [State Name]' Ransomware asks for money as the solution to this 'problem', and malware experts also confirm that the 'Cyber Command of [State Name]' Ransomware's pop-up continues to block your desktop in the meantime.
Pulling Your Personal PC Estate out of this State-Attacking Ransom Scam
Since the 'Cyber Command of [State Name]' Ransomware's attacks may block programs that are needed to safeguard your PC and, in fact, remove the 'Cyber Command of [State Name]' Ransomware, SpywareRemove.com malware researchers suggest that you disable the 'Cyber Command of [State Name]' Ransomware before other solutions are attempted. Basic features like Safe Mode or, if it's needed, booting your PC from a separate backup operating system, should be enough to disable the 'Cyber Command of [State Name]' Ransomware and allow you to run the anti-malware programs that can delete the 'Cyber Command of [State Name]' Ransomware. Paying the 'Cyber Command of [State Name]' Ransomware's ransom, of course, never should be contemplated – since the 'Cyber Command of [State Name]' Ransomware is an illegal program and will not unlock your computer even if you do make the mistake of giving the 'Cyber Command of [State Name]' Ransomware what it wants.
The 'Cyber Command of [State Name]' Ransomware and other Urausy variants often use exploits kits for their installations, which take advantage of both outdated software vulnerabilities and zero-day (unpatched) ones. Patching your software can reduce many vulnerabilities that could be used to this effect, while reliable anti-malware programs should be able to block these drive-by-downloads in other circumstances.
Technical Details
Additional Information
# | Message |
---|---|
1 | USA Cyber Crime Investigations Cyber Command of [State name] ATTENTION! Your computer has been blocked up for safety reasons listed below. You are accused of viewing/storage and/or dissemination of banned pornography (child pornography/zoophilia/rape etc). You have violated World Declaration on non-proliferation of child pornography. You are accused of committing the crime envisaged by Article 161 of United States of America criminal law. (...) The penalty set must be paid in course of 48 hours as of the breach. On expiration of the term, 48 hours that follow will be used for automatic collection of data on yourself and your misconduct, and criminal case wilt be opened against you. Amount of firm is 300$. You can settle the fine with MoneyPak or MoneyGram xpress Packet vouchers. (...) |
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.