Home Malware Programs Ransomware ‘Your Computer Blocked, Data Encrypted’ Virus

‘Your Computer Blocked, Data Encrypted’ Virus

Posted: May 24, 2013

Threat Metric

Threat Level: 2/10
Infected PCs: 15
First Seen: May 24, 2013
OS(es) Affected: Windows

Your Computer Blocked, Data Encrypted Virus Screenshot 1The 'Your Computer Blocked, Data Encrypted' Virus is a variant of the FBI Cybercrime Division Virus, and actually is a criminal program, instead of a software-based representative of the US Federal Bureau of Investigation. While the 'Your Computer Blocked, Data Encrypted' Virus creates a warning message that accuses your computer of being used for violating copyright laws, the 'Your Computer Blocked, Data Encrypted' Virus will create this pop-up automatically and without any effort to ascertain the innocence or guilt of the compromised computer. SpywareRemove.com malware experts also warn that the 'Your Computer Blocked, Data Encrypted' Virus is capable of locking you out of most Windows applications, and as a danger to your computer, should be removed both quickly and by a suitable anti-malware program.

The 'Your Computer Blocked, Data Encrypted' Virus: an FBI Notice You Can Afford to Shrug Off

The 'Your Computer Blocked, Data Encrypted' Virus claims to be affiliated with the United States FBI and displays some basic facts about your computer (such as your operating system and geographical region as determined by your IP address), along with boilerplate legal text, to convince you of this 'fact.' However, the 'Your Computer Blocked, Data Encrypted' Virus's real nature is that of a virtual extortionist that claims to block your computer as an authorized enforcement of the law and then demands to receive a payment through MoneyPak to remove its attack.

Along with locking down your PC, the 'Your Computer Blocked, Data Encrypted' Virus also threatens to encrypt your files – AKA, scramble the data so as to make them unreadable until they're decrypted. SpywareRemove.com malware researchers haven't seen any evidence of the 'Your Computer Blocked, Data Encrypted' Virus being capable of pulling off this attack, and even if a new variant of the 'Your Computer Blocked, Data Encrypted' Virus is upgraded for including this function, they do not recommend paying the 'Your Computer Blocked, Data Encrypted' Virus to restore any lost files. Some versions of the 'Your Computer Blocked, Data Encrypted' Virus also have been reported to include a webcam-capturing feature that will display your webcam input in a section of the fake pop-up alert.

How to Block a Windows-Blocking Virus

Although the 'Your Computer Blocked, Data Encrypted' Virus is not an actual computer virus and is, therefore, much easier to contain than a self-reproducing PC threat, the 'Your Computer Blocked, Data Encrypted' Virus is, nonetheless, problematic to remove. To block the 'Your Computer Blocked, Data Encrypted' Virus and regain your ability to use your PC as usual, SpywareRemove.com malware research team suggests using the Safe Mode feature or, in some cases, booting your OS from an uninfected flash drive. These methods also may be applied to similar types of fake FBI ransomware Trojans such as the International Cyber Security Protection Alliance Virus, the White Screen (FBI GreenDot) Virus, the FBI PayPal Virus, FBI Moneypak Ransomware and 'FBI Your PC is blocked' Ransomware.

When you've loaded Windows or any other OS without the 'Your Computer Blocked, Data Encrypted' Virus's fake alert locking your computer, you can continue with using whatever anti-malware software you feel is appropriate for removing the 'Your Computer Blocked, Data Encrypted' Virus. Since the 'Your Computer Blocked, Data Encrypted' Virus has a high probability of being installed by separate Trojans that also may be on your computer, SpywareRemove.com malware experts suggest using detailed system scans that are capable of detecting all PC threats related to a 'Your Computer Blocked, Data Encrypted' Virus infection.

Technical Details

Additional Information

The following messages's were detected:
# Message
1FBI Cybercrime Division International Cyber Security Protection Alliance WARNING! Your computer has been blocked and all your data were encrypted Reason: violation of Law. Possible violations are described below: Title 17- COPYRIGHTS Chapter 10, Subchapter B – COPYING CONTROLS (a) Prohibition on Importation, Manufacture, and Distribution.— No person shall import, manufacture, or distribute any digital audio recording device or digital audio interface device that does not conform to— (1) the Serial Copy Management System;
(2) a system that has the same functional characteristics as the Serial Copy Management System and requires that copyright and generation status information be accurately sent, received, and acted upon between devices using the system's method of serial copying regulation and devices using the Serial Copy Management System; or
(3) any other system certified by the Secretary of Commerce as prohibiting unauthorised serial copying.
Title 18 – CRIMES AND CRIMINAL PROCEDURE Title 18, Part I Chapter 117 § 2427
Inclusion of offences relating to child pornography in definition of sexual activity for which any person can be charged with a criminal offence.
Title 18 Part I Chapter 110, § 2258C Inclusion of offences relating to child pornography in definition of sexual activity for which any person can be charged with a criminal offence. a) Elements.—
(1) In general— The National Center for Missing and Exploited Children may provide elements relating to any apparent child pornography image of an identified child to an electronic communication service provider or a remote computing service provider for the sole and exclusive purpose of permitting that electronic communication service provider or remote computing service provider to stop the further transmission of images.
(2) Inclusions.— The elements authorised under paragraph (1) may include hash values or other unique identifiers associated with a specific image, Internet location of images, and other technological elements that can be used to identify and stop the transmission of child pornography.
(3) Exclusion— The elements authorised under paragraph (1) may not include the actual images.
(b) Use by Electronic Communication Service Providers and Remote Computing Service Providers.— Any electronic communication service provider or remote computing service provider that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under this section may use such information only for the purposes described in this section, provided that such use shall not relieve that electronic communication service provider or remote computing service provider from its reporting obligations under section 2258A.
(c) Limitations.— Nothing in subsections [1] (a) or (b) requires electronic communication service providers or remote computing service providers receiving elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children to use the elements to stop the further transmission of the images.
(d) Provision of Elements to Law Enforcement.— The National Center for Missing and Exploited Children shall make available to Federal.
State, and local law enforcement involved in the investigation of child pornography crimes elements, including hash values, relating to any apparent child pornography image of an identified child reported to the National Center for Missing and Exploited Children.
(e) Use by Law Enforcement.— Any Federal, State, or local law enforcement agency that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under section [1] (d) may use such elements only in the performance of the official duties of that agency to investigate child pornography crimes.
Title 18 Part I Chapter 110 § 22524
§ 2252A – Certain activities relating to material constituting or containing child pornography

Title 26 Subtitle F Chapter 78 > Subchapter A § 7612 Special procedures for summonses for computer software To unlock your computer you must pay a penalty within 24 hours and input voucher axle to a form below. It will take up to 24 hours to check voucher code and decrypt your data.

Loading...