fbi virus

How to Remove FBI Virus (Removal Guide)

The “FBI virus” is one of the most well known ransomware scams ever distributed in the United States. It first appeared in 2012 as a full-screen lock screen that falsely claimed to be issued by the Federal Bureau of Investigation and demanded payment through MoneyPak vouchers. Botcrawl was among the first publications to document this threat and publicly identify it as the “FBI virus” or “FBI MoneyPak virus.” As the campaign spread, it became one of the most widely searched ransomware infections in the country. While the original malware variants are no longer widespread, FBI-themed scams and lock screens continue to resurface in modern forms, including browser lockers, online extortion schemes, and mobile ransomware.

FBI Virus

Although the original FBI MoneyPak ransomware relied on prepaid vouchers and basic screen-locking techniques, the core social engineering strategy behind it has remained largely unchanged. Modern versions of the FBI virus no longer need to fully lock a device to intimidate victims. Instead, they exploit fear through browser-based lock screens, fake law enforcement warnings, phishing emails, malicious advertisements, and scam websites designed to pressure users into paying fabricated fines, surrendering personal information, or installing additional malware. These newer schemes often appear more polished, use updated branding, and target both desktop and mobile users, allowing the threat to persist long after the original campaign faded.

FBI Moneypak virus

This article traces the FBI virus from its earliest ransomware campaigns to the modern scams modeled after it. It explains how the original FBI MoneyPak malware operated, how its tactics evolved over time, and how to remove FBI-themed malware and lock screens using modern security tools. It also examines how early law enforcement impersonation schemes influenced today’s ransomware and extortion tactics, along with practical steps to protect devices from current file-encrypting attacks and fake authority warnings.

What is the FBI Virus?

The FBI virus was a type of ransomware that locked a user out of their computer and displayed a fake warning claiming to be from the Federal Bureau of Investigation. The message accused victims of viewing illegal content or violating federal law and demanded a fee to unlock the device. Payments were commonly requested through prepaid voucher systems such as MoneyPak, Ukash, Paysafecard, or Reloadit.

The FBI virus was one of the earliest widespread ransomware families in the United States. Instead of encrypting files like modern ransomware, it restricted access to the entire desktop and prevented the user from accessing Windows until a fake fine was paid. The goal was simple intimidation. Many victims complied out of fear, especially when the message displayed their location, IP address, or webcam feed.

Although the original FBI virus has faded, scammers still use FBI branding to scare users through browser pop ups, online extortion messages, and fraudulent phone calls. These threats use modern tactics but rely on the same psychological pressure as the original ransomware.

How the FBI Virus Spread

The original FBI virus spread through many of the same infection techniques used by malware today. These included:

  • Exploit kits that delivered ransomware when a victim visited an infected website
  • Malicious email attachments disguised as invoices or notices
  • Drive by downloads from compromised sites and ads
  • Fake software updates that installed ransomware instead of legitimate updates
  • Bundled installers combined with pirated software or fake media players

Exploit kits were particularly effective at the time because many users were still on outdated versions of Java, Flash Player, and Internet Explorer. A single visit to a compromised site could trigger an automatic ransomware installation.

Symptoms of the FBI Virus

Most victims of the FBI virus experienced obvious symptoms such as a full screen lockout. However, related scams can behave differently today. Common symptoms include:

  • A full screen window displaying an FBI message
  • Loss of access to the desktop
  • Keyboard shortcuts disabled
  • Webcam activates without permission
  • New browser tabs forcing an FBI warning
  • Pop ups claiming your device is under investigation
  • Unexpected redirects to law enforcement themed pages

If you encounter any of these symptoms, your device may be compromised by a lock screen Trojan, browser hijacker, or scam website script.

Modern Variants and Related Threats

Although the original ransomware family is obsolete, modern threats continue to use FBI branding. These include:

  • FBI browser lockers that freeze a browser tab with a fake FBI warning
  • FBI phone scams where scammers call victims pretending to be agents
  • FBI email scams that threaten legal action unless payment is made
  • Mobile ransomware on Android that locks the screen with FBI logos
  • Fake security alerts that redirect users to tech support scams

These threats do not function like the original ransomware, but they use the same pressure tactics and are often combined with phishing, payment fraud, and identity theft.

Remove the FBI Virus with Malwarebytes (Recommended)

The most effective way to remove an FBI virus infection is to scan your device with a trusted anti malware tool. We recommend using Malwarebytes because it specializes in removing ransomware, adware, browser hijackers, and potentially unwanted programs. Manual removal may not detect hidden files or startup entries, so using an automated scanner is the safest option.

Follow these steps to remove the FBI virus using Malwarebytes:

mbsetup

  1. Download Malwarebytes and save the installer to your Downloads folder. Double click it to begin installation.

install malwarebytes

  1. Follow the on screen instructions to install Malwarebytes on your Windows device.

choose your protection type

  1. Select whether you are installing Malwarebytes for personal or business use and click Next.

malwarebytes browser guard

  1. You may be offered Malwarebytes Browser Guard. You can add it or skip this step.

malwarebytes get started

  1. Once installation is complete, open Malwarebytes and click Get Started.

malwarebytes all in one protection

  1. If using the free version, you will receive a trial of Malwarebytes Premium. After the trial ends, the program continues working as an on demand scanner.

malwarebytes scan

  1. From the dashboard, click Scan. Malwarebytes will check memory, startup items, registry entries, and files for ransomware and related threats.

scanning for threats

  1. Wait for the scan to complete. This may take several minutes.

threats detected

  1. When the scan finishes, review the detected threats and click Quarantine to remove them. You may be prompted to restart your computer.

malwarebytes trusted advisor

  1. After rebooting, Malwarebytes may run additional checks to confirm your system is clean.

Manual Removal for Windows

If you still have access to your desktop or are dealing with a browser based FBI scam, these manual steps can help you remove unwanted components. Manual removal should be followed by a Malwarebytes scan to ensure no hidden remnants remain.

Step 1. Uninstall suspicious programs

  1. Right click Start and select Installed apps or Apps and Features.
  2. Sort by install date to locate recent additions.
  3. Uninstall programs you do not recognize or installed around the time the lock screen appeared.

Step 2. Remove browser notifications from fake FBI sites

  • Chrome: chrome://settings/content/notifications
  • Edge: Settings > Cookies and site permissions > Notifications
  • Firefox: Settings > Privacy and Security > Permissions

Step 3. Remove unwanted browser extensions

  • Chrome: chrome://extensions
  • Edge: Settings > Extensions
  • Firefox: about:addons

Step 4. Restore your default search engine

Restore Google, DuckDuckGo, or your preferred provider.

Step 5. Reset browser settings if symptoms continue

  • Chrome: chrome://settings/reset
  • Edge: Settings > Reset settings
  • Firefox: Help > More Troubleshooting Information > Refresh Firefox

Step 6. Clear cookies and site data

Remove cached FBI scam pages and redirects by clearing cookies and browsing data.

Step 7. Delete temporary files

Remove temporary files that may contain scripts or installers.

Advanced Checks for Persistent Issues

If you still see warnings or redirects, perform these advanced checks:

Check browser shortcuts

Right click your browser shortcut and ensure the Target field only contains the browser executable path.

Check Windows hosts file

Inspect C:\Windows\System32\drivers\etc\hosts for unwanted entries.

Check proxy and DNS settings

Ensure no unexpected proxies or DNS servers are configured.

Check Chrome policies

Visit chrome://policy to see if malware has enforced settings.

Review Task Scheduler

Look for tasks that launch unknown executables.

For more malware removal guides and cybersecurity alerts, visit our latest updates in the malware category.

Sean Doyle

Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.

Post navigation

  • Pingback: How to Remove FBI MoneyPak Virus — Technipages
  • The easiest way around the program starting up is to completely remove Internet access to your computer. Tried removing the files manually, but it sucks on Windows 7. Easier to just do a system restore. Your computer manually sets a restore point pretty often (mine was done at noon today and another one was done 4 days ago).

    • If you do a system restore, would you lose anything like progress made on a written document or something, or does it only restore files, and leaves anything manually saved?

  • Pingback: Moneypack info | Cheapdiningout
  • Pingback: FBI Moneypak Computer Virus
  • Hi Sean,
    Thanks a lot for the solution.System restore worked for me.But my doubt is,does system restore mean that the malware/Virus is removed from the laptop?
    Currently am scanning with Malwarebytes (After performing system restore)).It is showing Objects detected :30 …will update the complete status once it completes the scan.are these 30 objects related to pre existing virus or are they related to FBI mypack? is there any way to know this?

    i tried scanning using mbam2.exe(not sure if this is same as Malwarebytes).although i got a popup saying 12 objects/trojans have been removed, issue still existed for me.
    On doing system restore i was able to restore the system back to old state. what am not sure is if the virus is completely removed or not.

    Please let me know your thoughts.

    Thanks
    Sud

  • Hi Sean,
    Thanks a lot for the solution.System restore worked for me.But my doubt is,does system restore mean that the malware/Virus is removed from the laptop?
    Currently am scanning with Malwarebytes (After performing system restore)).It is showing Objects detected :30 …will update the complete status once it completes the scan.are these 30 objects related to pre existing virus or are they related to FBI mypack? is there any way to know this?

  • I found if you remove the shortcut from the start up folder the computer won’t lock up but I can’t get the Internet to work now. Thanks to this helpful form I now know what it is now and now to kill the scam and everything with it.

  • Got two of ’em in the past week and a half. I see the FBI’s finally posted an official denial. What I don’t see is software designers so dedicated to artistically exploiting the schema-themes would deny us the value of a decent screen saver.

  • Always remember the following. The FBI does not have the authority to fine people. This can only be done in a court of law. So the first thing you have to realize is that even even if you were looking at a video of a person having sex with an underage horse or dog or cat is that you are looking at a malware situation. Proceed accordingly most of the time you can save yourself $200 and fix the problem. Don’t forget to keep your AVG or whatever you happen to use up to date and active. Learn how to boot into safe mode. I know it’s all very frustrating but it is part of modern life. What really drives people crazy, myself included is that you really want revenge. You probably will not get it since a lot of this stuff is written in foreign countries. Do you really want to spend a couple of years draging your ass around some miserable shithole country looking for some programmer who probably would cut your throat if you actually found him/her? Your satisfaction comes from the fact that they didn’t get your $200 and you are smarter and better than they are. Good luck.

  • This page popped up on my screen about an hour ago and scared the hell out of me. I don’t even use my computer for anything other than schoolwork and I guess I visited an unsafe link of off some random media site. Needless to say, I was a little skeptical. This article walked me through flawlessly. Thanks a million…or two hundred at least, that’s what I saved thanks to you guys. Very appreciative of all of the guidance as I am not much of a computer wiz.

  • I’m running walwarebytes right now, I managed to restore windows to a couple of days ago through safe mode with networking…I nearly soiled my pants when this popped up! Hopefully it’s fully gone, don’t want my spouse to see this…

  • WOW! HUGE THANKS TO STEP 4!!!! Easy steps to follow, make sure to right click on the “ctfmon” file and click delete. I about shat myself when that fake FBI popped up…swooo

  • LMAO!!! That person(s) took all the time to write the virus for such an easy fix. Walked my sis thru the fix via cell, and discovered that the same virus was infecting my sons acct only on a cpu, here with three accts. Gonna fix that one myself. (glad I have my own laptop) Thanks for the info!! Nice and easy!!

  • This is how I did it and I didn’t have to download anything nor play with Windows settings (I have an XP PC though I think in 7 it will be the same outcome). I just turned off the PC, waited a few seconds, turned on PC and while I saw the PC booting up I kept pressing several times the F8 key. This took me to a screen that presented the different ways I can start Windows. I chose Safe Booting and pressed Enter. Then I just waited for Windows to boot up. The Windows desktop is going to look strange because Safe Boot will install just the basic drivers (and includes the video drivers). Then I went to Restore from All Programs/Accessories/System Tools. I selected a date prior to when I had the MonayPak virus incident and pressed OK. The Restore command restored it to the way I had my PC on that day and thus, basically, replaced all setting that virus might had change or altered.

    Good luck

  • Thanks for the tips. I saved my kid’s bacon last night by downloading the free version of MalwareBytes onto a flash drive on a second (non infected) computer, then turning off my router and installing the anti-malware onto the infected unit. It saw it right away and zapped it. The kid had to do his homework after all. Thanks.

  • I have another solution that can be added to this list!

    1. turn off your computer
    2. unplug your internet connection
    3. turn the machine back on, the virus can only open if your machine is plugged into the internet!
    4. using a flash drive, get malwarebytes from another computer and load it onto yours
    5. run a full system scan, malwarebytes will find and eradicate every file, there were 10 files altogether!
    6. restart when asked, and boom virus eradicated

  • I WASN’T DOING ANYTHING WRONG! Was just looking at some wiring diagram images on the web for my old mustangs when this “mess” started popping up and then the FBI screen.
    Restoring my computer did the trick for me. Started up in Safe Mode and ran the restore file Rstrui.exe from the Start Menu. Selected an earlier restore point and all is good. Not sure what caused my other problem but the only side affect was that all my data files in the user, my documents folders, were gone. Finally realized that the files were present but they were all “hidden”. Had to go to View in the Folder Option and select the “show hidden files” button. Then was able to see the files and go to file properties and uncheck the attributes “hidden” box.
    THANKS so much for this site. Keep up the good work!

  • Omg omg omg! I almost had a heart attack. I was like wtf did I do to deserve this. When it popped up and I didn’t know what to do I though to myself ” my dad is going to kill me!” Then I desided to go on my iPod and see what I could do. And man, this site helped me a lot. So I thank you very much!

  • Question – If I have 2 accounts, one infected and one not, and I run MalwareBytes from the non-infected account, will it kill the virus on the infected one?

  • Bloody FBI virus on a Windows XP laptop. Icannot get into safemode command prompt as it demands the sys admin password and I have not worked at the company where I got computer for 3 years… in standard safemode the virus locks me out… The Task Manager button (@ alt-ctrl-del) is greyed out and does not work to allow me to stop the program. Basically I am completely locked out of my computer and cannot even get to the point where I can follow the directions above. Has anybody hit this wall and come up with a solution?

    I unplugged the ethernet cable and the virus gets hung up with the “this window may take 30 seconds to load…” but it never relinquishes the screen back to me.

    This is not my main system but I do have a number of files I do need to access that have not been backed up.

    The system I am posting from is a workplace mac (virus on personal PC). Is there something I can download to a thumb drive and force the PC to boot from the thumbdrive – allowing me to follow the cleaning instructions

    If anyone has a suggestion please forward… Thanks!

    • I was able to run antiviruses if i left the internet off from the start; every time I activated the wireless, it’d lock me out-so i left it off. Malware-bytes seemed to take care of it for me.

  • I cleaned this my self. it wasn’t easy. follow the money. who stands to profit? how about all these expensive malware blockers like mcafee & norton who didn’t catch this but they want additional money to clean your pc….

  • Got what appears to be a new variant – could not locate any of the files or settings in manual remove steps while looking from another account in Vista. It had disabled defender and task manager. Also could not find from safe mode except for a (random).exe that I renamed.
    Ran a system restore from safe mode with command prompt and that appears to have fixed things. Looking deep and hard for any remnants. This is a nasty virus and I would like to learn what it’s entry point is. Based on logs, it appears to exploited either flash or the java updater.

    THANK YOU!! for the guidance.

  • This is a good article, it was very helpful when I had to remove it from a family member’s computer. Not sure if the virus has gotten stronger or what, but whenever I booted into safe mode, none of the files for the virus showed up, not even in the registry. Even Malwarebytes didn’t pick up on. I ended up using No. 5 to get it off. Otherwise I’d have had to go with the system restore option, which would have been a pain to do.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.