The “FBI virus” is one of the most well known ransomware scams ever distributed in the United States. It first appeared in 2012 as a full-screen lock screen that falsely claimed to be issued by the Federal Bureau of Investigation and demanded payment through MoneyPak vouchers. Botcrawl was among the first publications to document this threat and publicly identify it as the “FBI virus” or “FBI MoneyPak virus.” As the campaign spread, it became one of the most widely searched ransomware infections in the country. While the original malware variants are no longer widespread, FBI-themed scams and lock screens continue to resurface in modern forms, including browser lockers, online extortion schemes, and mobile ransomware.

Although the original FBI MoneyPak ransomware relied on prepaid vouchers and basic screen-locking techniques, the core social engineering strategy behind it has remained largely unchanged. Modern versions of the FBI virus no longer need to fully lock a device to intimidate victims. Instead, they exploit fear through browser-based lock screens, fake law enforcement warnings, phishing emails, malicious advertisements, and scam websites designed to pressure users into paying fabricated fines, surrendering personal information, or installing additional malware. These newer schemes often appear more polished, use updated branding, and target both desktop and mobile users, allowing the threat to persist long after the original campaign faded.

This article traces the FBI virus from its earliest ransomware campaigns to the modern scams modeled after it. It explains how the original FBI MoneyPak malware operated, how its tactics evolved over time, and how to remove FBI-themed malware and lock screens using modern security tools. It also examines how early law enforcement impersonation schemes influenced today’s ransomware and extortion tactics, along with practical steps to protect devices from current file-encrypting attacks and fake authority warnings.
What is the FBI Virus?
The FBI virus was a type of ransomware that locked a user out of their computer and displayed a fake warning claiming to be from the Federal Bureau of Investigation. The message accused victims of viewing illegal content or violating federal law and demanded a fee to unlock the device. Payments were commonly requested through prepaid voucher systems such as MoneyPak, Ukash, Paysafecard, or Reloadit.
The FBI virus was one of the earliest widespread ransomware families in the United States. Instead of encrypting files like modern ransomware, it restricted access to the entire desktop and prevented the user from accessing Windows until a fake fine was paid. The goal was simple intimidation. Many victims complied out of fear, especially when the message displayed their location, IP address, or webcam feed.
Although the original FBI virus has faded, scammers still use FBI branding to scare users through browser pop ups, online extortion messages, and fraudulent phone calls. These threats use modern tactics but rely on the same psychological pressure as the original ransomware.
How the FBI Virus Spread
The original FBI virus spread through many of the same infection techniques used by malware today. These included:
- Exploit kits that delivered ransomware when a victim visited an infected website
- Malicious email attachments disguised as invoices or notices
- Drive by downloads from compromised sites and ads
- Fake software updates that installed ransomware instead of legitimate updates
- Bundled installers combined with pirated software or fake media players
Exploit kits were particularly effective at the time because many users were still on outdated versions of Java, Flash Player, and Internet Explorer. A single visit to a compromised site could trigger an automatic ransomware installation.
Symptoms of the FBI Virus
Most victims of the FBI virus experienced obvious symptoms such as a full screen lockout. However, related scams can behave differently today. Common symptoms include:
- A full screen window displaying an FBI message
- Loss of access to the desktop
- Keyboard shortcuts disabled
- Webcam activates without permission
- New browser tabs forcing an FBI warning
- Pop ups claiming your device is under investigation
- Unexpected redirects to law enforcement themed pages
If you encounter any of these symptoms, your device may be compromised by a lock screen Trojan, browser hijacker, or scam website script.
Modern Variants and Related Threats
Although the original ransomware family is obsolete, modern threats continue to use FBI branding. These include:
- FBI browser lockers that freeze a browser tab with a fake FBI warning
- FBI phone scams where scammers call victims pretending to be agents
- FBI email scams that threaten legal action unless payment is made
- Mobile ransomware on Android that locks the screen with FBI logos
- Fake security alerts that redirect users to tech support scams
These threats do not function like the original ransomware, but they use the same pressure tactics and are often combined with phishing, payment fraud, and identity theft.
Remove the FBI Virus with Malwarebytes (Recommended)
The most effective way to remove an FBI virus infection is to scan your device with a trusted anti malware tool. We recommend using Malwarebytes because it specializes in removing ransomware, adware, browser hijackers, and potentially unwanted programs. Manual removal may not detect hidden files or startup entries, so using an automated scanner is the safest option.
Follow these steps to remove the FBI virus using Malwarebytes:

- Download Malwarebytes and save the installer to your Downloads folder. Double click it to begin installation.

- Follow the on screen instructions to install Malwarebytes on your Windows device.

- Select whether you are installing Malwarebytes for personal or business use and click Next.

- You may be offered Malwarebytes Browser Guard. You can add it or skip this step.

- Once installation is complete, open Malwarebytes and click Get Started.

- If using the free version, you will receive a trial of Malwarebytes Premium. After the trial ends, the program continues working as an on demand scanner.

- From the dashboard, click Scan. Malwarebytes will check memory, startup items, registry entries, and files for ransomware and related threats.

- Wait for the scan to complete. This may take several minutes.

- When the scan finishes, review the detected threats and click Quarantine to remove them. You may be prompted to restart your computer.

- After rebooting, Malwarebytes may run additional checks to confirm your system is clean.
Manual Removal for Windows
If you still have access to your desktop or are dealing with a browser based FBI scam, these manual steps can help you remove unwanted components. Manual removal should be followed by a Malwarebytes scan to ensure no hidden remnants remain.
Step 1. Uninstall suspicious programs
- Right click Start and select Installed apps or Apps and Features.
- Sort by install date to locate recent additions.
- Uninstall programs you do not recognize or installed around the time the lock screen appeared.
Step 2. Remove browser notifications from fake FBI sites
- Chrome: chrome://settings/content/notifications
- Edge: Settings > Cookies and site permissions > Notifications
- Firefox: Settings > Privacy and Security > Permissions
Step 3. Remove unwanted browser extensions
- Chrome: chrome://extensions
- Edge: Settings > Extensions
- Firefox: about:addons
Step 4. Restore your default search engine
Restore Google, DuckDuckGo, or your preferred provider.
Step 5. Reset browser settings if symptoms continue
- Chrome: chrome://settings/reset
- Edge: Settings > Reset settings
- Firefox: Help > More Troubleshooting Information > Refresh Firefox
Step 6. Clear cookies and site data
Remove cached FBI scam pages and redirects by clearing cookies and browsing data.
Step 7. Delete temporary files
Remove temporary files that may contain scripts or installers.
Advanced Checks for Persistent Issues
If you still see warnings or redirects, perform these advanced checks:
Check browser shortcuts
Right click your browser shortcut and ensure the Target field only contains the browser executable path.
Check Windows hosts file
Inspect C:\Windows\System32\drivers\etc\hosts for unwanted entries.
Check proxy and DNS settings
Ensure no unexpected proxies or DNS servers are configured.
Check Chrome policies
Visit chrome://policy to see if malware has enforced settings.
Review Task Scheduler
Look for tasks that launch unknown executables.
For more malware removal guides and cybersecurity alerts, visit our latest updates in the malware category.

540 Comments
[…] How to remove FBI virus (Ransomware Removal Guide) | Botcrawl […]
[…] says: August 9, 2012 at 5:20 pm Got this virus and just about fell out of my chair. http://botcrawl.com/how-to-remove-the-fbi-moneypak-ransomware-virus-fake-fbi-malware-removal/ Your computer has been blocked” notification from the Federal Bureau of Investigation asking […]
[…] FBI virus, help!2Stop ilqoxken.exe if you want to get rid of FBI virus2Fbi Green Dot Moneypak virus http://botcrawl.com/how-to-remove-the-fbi-moneypak-ransomware-virus-fake-fbi-malware-removal/ It was a pain, even for a seasoned vet. How To Remove Fbi Virus From Android […]
[…] Eventhough it has a reset option you access using a paper clip . Logga in 26 Läser in … Anyway what do I need to do? Avoid Android Ransomware In The First Place If you are indiscriminate or careless about the apps you install on your Android phone or tablet, you might just find that some ransomware http://botcrawl.com/how-to-remove-the-fbi-moneypak-ransomware-virus-fake-fbi-malware-removal/ […]
I just go to the “task manager” and in “applications” find the the one that indicates the virus and right click it and “end”. It will close your browser. If you reopen your browser you may have the option to “restore” web pages, don’t do it. Better to reboot at this time.
To start “task manager” press keys Ctrl, Shift and Esc. Go from there. I also use CCleaner if I don’t reboot.
I have run Malwarebytes and other scanners after all this and I never find anything related to the ransom virus.
All u have to do is type in all the credit card information useing all fake numbers push send and ur device will immediately unlock!
[…] are used to block Internet access, and an unknown login is created. Basic strains of this virus can be removed through free versions of Malwarebytes and Hitman […]
[…] How to remove FBI virus (Ransomware Removal Guide … – How to remove FBI virus, malware, and fake FBI ransomware that locks … to decrypt your files for free. Aliases: FBI virus, … FBI virus removal guide contains … […]
[…] How to remove the FBI virus (Removal Guide) | Botcrawl … – This FBI virus removal guide contains easy instructions to remove FBI viruses from Windows, Mac, and affected internet browsers. Remove the FBI virus with this free … […]
[…] How to remove the FBI virus (Removal Guide) | … – This FBI virus removal guide contains easy instructions to remove FBI viruses from Windows, Mac, and affected internet browsers. Remove the FBI virus with this free … […]
[…] are used to block Internet access, and an unknown login is created. Basic strains of this virus can be removed through free versions of Malwarebytes and Hitman […]
I have Verizon wireless. I took my phone to them and they reset my phone and it was removed.
This info saved my life butall I had to do was factory reset my phone that was my only option at that point I despize people who make dumb viruses and reak havoc on in knowing people
the moneypak virus goes full screen on my compu and won’t let me do anything at all. how did you guys get this antivirus program to load and work????
Thanks!
phew!!! The first time I saw this I tried forever to download malaware bytes but some reason my laptop wouldn’t except it. so I shut down the machine and looked at my options. I was thinking about haveing somebody just fix it for me but today the malaware bytes worked!! goodbye fbi virus…..have fun in new mexico~XD
your free malware software found and killed this virus with no problem. Thank you all very much
Does anyone have a free moneypak code that will work for me.
What if i don’t pay it would it stay there? ….what would happen i have a tablet so it blocks everything and i cant get into anything ….can so one please help…
thank you
My phone is infected. HELP!!!
I just went to settings in my iPhone and then went to the safari portion. Once there, there should be an option to clear all data and history from your browser. I clicked on that and it seemed to do the trick for me.
YESSS!!!!!!
That worked for me also. Thanks
removal: in chrome/fe goto tools –> developer tools –> elements. u will see html inside head tag , right click on the script tag and delete all of them and then close the browser. Also u can try putting in any 14 digit number and click the submit button it will always work
hope this works.
how did your fbi thing happen
i like pankakes
hahaha…
Kudos to whoever wrote this. It was a pain, even for a seasoned vet.
On an older slower machine, you have roughly 3 seconds after explorer.exe loads before the virus takes control. If your fast, you can ctrl-alt-delete and get to task manager in time to force quit explorer.exe. Closed a couple of the non critical processes, and new process explorer.exe.
Luckily I was able to get into windows, and run malware bytes.
7 of the malicious files were hiding out in the \windows\temp\(8 random chars).exe
and a final in \documents and settings\(username)\local settings\temp\(18 random chars).exe
i love the ppl that poseed this im going to make it much more strict and back track ip and resend
Information above helped me get rid of the virus. Very accurate info, thank you.
I have this on a Mac it just blocks Chrome.