‘Your Computer Blocked, Data Encrypted’ Virus
Posted: May 24, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 15 |
First Seen: | May 24, 2013 |
---|---|
OS(es) Affected: | Windows |
The 'Your Computer Blocked, Data Encrypted' Virus is a variant of the FBI Cybercrime Division Virus, and actually is a criminal program, instead of a software-based representative of the US Federal Bureau of Investigation. While the 'Your Computer Blocked, Data Encrypted' Virus creates a warning message that accuses your computer of being used for violating copyright laws, the 'Your Computer Blocked, Data Encrypted' Virus will create this pop-up automatically and without any effort to ascertain the innocence or guilt of the compromised computer. SpywareRemove.com malware experts also warn that the 'Your Computer Blocked, Data Encrypted' Virus is capable of locking you out of most Windows applications, and as a danger to your computer, should be removed both quickly and by a suitable anti-malware program.
The 'Your Computer Blocked, Data Encrypted' Virus: an FBI Notice You Can Afford to Shrug Off
The 'Your Computer Blocked, Data Encrypted' Virus claims to be affiliated with the United States FBI and displays some basic facts about your computer (such as your operating system and geographical region as determined by your IP address), along with boilerplate legal text, to convince you of this 'fact.' However, the 'Your Computer Blocked, Data Encrypted' Virus's real nature is that of a virtual extortionist that claims to block your computer as an authorized enforcement of the law and then demands to receive a payment through MoneyPak to remove its attack.
Along with locking down your PC, the 'Your Computer Blocked, Data Encrypted' Virus also threatens to encrypt your files – AKA, scramble the data so as to make them unreadable until they're decrypted. SpywareRemove.com malware researchers haven't seen any evidence of the 'Your Computer Blocked, Data Encrypted' Virus being capable of pulling off this attack, and even if a new variant of the 'Your Computer Blocked, Data Encrypted' Virus is upgraded for including this function, they do not recommend paying the 'Your Computer Blocked, Data Encrypted' Virus to restore any lost files. Some versions of the 'Your Computer Blocked, Data Encrypted' Virus also have been reported to include a webcam-capturing feature that will display your webcam input in a section of the fake pop-up alert.
How to Block a Windows-Blocking Virus
Although the 'Your Computer Blocked, Data Encrypted' Virus is not an actual computer virus and is, therefore, much easier to contain than a self-reproducing PC threat, the 'Your Computer Blocked, Data Encrypted' Virus is, nonetheless, problematic to remove. To block the 'Your Computer Blocked, Data Encrypted' Virus and regain your ability to use your PC as usual, SpywareRemove.com malware research team suggests using the Safe Mode feature or, in some cases, booting your OS from an uninfected flash drive. These methods also may be applied to similar types of fake FBI ransomware Trojans such as the International Cyber Security Protection Alliance Virus, the White Screen (FBI GreenDot) Virus, the FBI PayPal Virus, FBI Moneypak Ransomware and 'FBI Your PC is blocked' Ransomware.
When you've loaded Windows or any other OS without the 'Your Computer Blocked, Data Encrypted' Virus's fake alert locking your computer, you can continue with using whatever anti-malware software you feel is appropriate for removing the 'Your Computer Blocked, Data Encrypted' Virus. Since the 'Your Computer Blocked, Data Encrypted' Virus has a high probability of being installed by separate Trojans that also may be on your computer, SpywareRemove.com malware experts suggest using detailed system scans that are capable of detecting all PC threats related to a 'Your Computer Blocked, Data Encrypted' Virus infection.
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to ‘Your Computer Blocked, Data Encrypted’ Virus may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
Download SpyHunter's Malware ScannerNote: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.
Technical Details
Additional Information
# | Message |
---|---|
1 | FBI Cybercrime Division International Cyber Security Protection Alliance WARNING! Your computer has been blocked and all your data were encrypted Reason: violation of Law. Possible violations are described below: Title 17- COPYRIGHTS Chapter 10, Subchapter B – COPYING CONTROLS (a) Prohibition on Importation, Manufacture, and Distribution.— No person shall import, manufacture, or distribute any digital audio recording device or digital audio interface device that does not conform to— (1) the Serial Copy Management System; (2) a system that has the same functional characteristics as the Serial Copy Management System and requires that copyright and generation status information be accurately sent, received, and acted upon between devices using the system's method of serial copying regulation and devices using the Serial Copy Management System; or (3) any other system certified by the Secretary of Commerce as prohibiting unauthorised serial copying. Title 18 – CRIMES AND CRIMINAL PROCEDURE Title 18, Part I Chapter 117 § 2427 Inclusion of offences relating to child pornography in definition of sexual activity for which any person can be charged with a criminal offence. Title 18 Part I Chapter 110, § 2258C Inclusion of offences relating to child pornography in definition of sexual activity for which any person can be charged with a criminal offence. a) Elements.— (1) In general— The National Center for Missing and Exploited Children may provide elements relating to any apparent child pornography image of an identified child to an electronic communication service provider or a remote computing service provider for the sole and exclusive purpose of permitting that electronic communication service provider or remote computing service provider to stop the further transmission of images. (2) Inclusions.— The elements authorised under paragraph (1) may include hash values or other unique identifiers associated with a specific image, Internet location of images, and other technological elements that can be used to identify and stop the transmission of child pornography. (3) Exclusion— The elements authorised under paragraph (1) may not include the actual images. (b) Use by Electronic Communication Service Providers and Remote Computing Service Providers.— Any electronic communication service provider or remote computing service provider that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under this section may use such information only for the purposes described in this section, provided that such use shall not relieve that electronic communication service provider or remote computing service provider from its reporting obligations under section 2258A. (c) Limitations.— Nothing in subsections [1] (a) or (b) requires electronic communication service providers or remote computing service providers receiving elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children to use the elements to stop the further transmission of the images. (d) Provision of Elements to Law Enforcement.— The National Center for Missing and Exploited Children shall make available to Federal. State, and local law enforcement involved in the investigation of child pornography crimes elements, including hash values, relating to any apparent child pornography image of an identified child reported to the National Center for Missing and Exploited Children. (e) Use by Law Enforcement.— Any Federal, State, or local law enforcement agency that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under section [1] (d) may use such elements only in the performance of the official duties of that agency to investigate child pornography crimes. Title 18 Part I Chapter 110 § 22524 § 2252A – Certain activities relating to material constituting or containing child pornography Title 26 Subtitle F Chapter 78 > Subchapter A § 7612 Special procedures for summonses for computer software To unlock your computer you must pay a penalty within 24 hours and input voucher axle to a form below. It will take up to 24 hours to check voucher code and decrypt your data. |
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.