fbi virus

How to Remove FBI Virus (Removal Guide)

The “FBI virus” is one of the most well known ransomware scams ever distributed in the United States. It first appeared in 2012 as a full-screen lock screen that falsely claimed to be issued by the Federal Bureau of Investigation and demanded payment through MoneyPak vouchers. Botcrawl was among the first publications to document this threat and publicly identify it as the “FBI virus” or “FBI MoneyPak virus.” As the campaign spread, it became one of the most widely searched ransomware infections in the country. While the original malware variants are no longer widespread, FBI-themed scams and lock screens continue to resurface in modern forms, including browser lockers, online extortion schemes, and mobile ransomware.

FBI Virus

Although the original FBI MoneyPak ransomware relied on prepaid vouchers and basic screen-locking techniques, the core social engineering strategy behind it has remained largely unchanged. Modern versions of the FBI virus no longer need to fully lock a device to intimidate victims. Instead, they exploit fear through browser-based lock screens, fake law enforcement warnings, phishing emails, malicious advertisements, and scam websites designed to pressure users into paying fabricated fines, surrendering personal information, or installing additional malware. These newer schemes often appear more polished, use updated branding, and target both desktop and mobile users, allowing the threat to persist long after the original campaign faded.

FBI Moneypak virus

This article traces the FBI virus from its earliest ransomware campaigns to the modern scams modeled after it. It explains how the original FBI MoneyPak malware operated, how its tactics evolved over time, and how to remove FBI-themed malware and lock screens using modern security tools. It also examines how early law enforcement impersonation schemes influenced today’s ransomware and extortion tactics, along with practical steps to protect devices from current file-encrypting attacks and fake authority warnings.

What is the FBI Virus?

The FBI virus was a type of ransomware that locked a user out of their computer and displayed a fake warning claiming to be from the Federal Bureau of Investigation. The message accused victims of viewing illegal content or violating federal law and demanded a fee to unlock the device. Payments were commonly requested through prepaid voucher systems such as MoneyPak, Ukash, Paysafecard, or Reloadit.

The FBI virus was one of the earliest widespread ransomware families in the United States. Instead of encrypting files like modern ransomware, it restricted access to the entire desktop and prevented the user from accessing Windows until a fake fine was paid. The goal was simple intimidation. Many victims complied out of fear, especially when the message displayed their location, IP address, or webcam feed.

Although the original FBI virus has faded, scammers still use FBI branding to scare users through browser pop ups, online extortion messages, and fraudulent phone calls. These threats use modern tactics but rely on the same psychological pressure as the original ransomware.

How the FBI Virus Spread

The original FBI virus spread through many of the same infection techniques used by malware today. These included:

  • Exploit kits that delivered ransomware when a victim visited an infected website
  • Malicious email attachments disguised as invoices or notices
  • Drive by downloads from compromised sites and ads
  • Fake software updates that installed ransomware instead of legitimate updates
  • Bundled installers combined with pirated software or fake media players

Exploit kits were particularly effective at the time because many users were still on outdated versions of Java, Flash Player, and Internet Explorer. A single visit to a compromised site could trigger an automatic ransomware installation.

Symptoms of the FBI Virus

Most victims of the FBI virus experienced obvious symptoms such as a full screen lockout. However, related scams can behave differently today. Common symptoms include:

  • A full screen window displaying an FBI message
  • Loss of access to the desktop
  • Keyboard shortcuts disabled
  • Webcam activates without permission
  • New browser tabs forcing an FBI warning
  • Pop ups claiming your device is under investigation
  • Unexpected redirects to law enforcement themed pages

If you encounter any of these symptoms, your device may be compromised by a lock screen Trojan, browser hijacker, or scam website script.

Modern Variants and Related Threats

Although the original ransomware family is obsolete, modern threats continue to use FBI branding. These include:

  • FBI browser lockers that freeze a browser tab with a fake FBI warning
  • FBI phone scams where scammers call victims pretending to be agents
  • FBI email scams that threaten legal action unless payment is made
  • Mobile ransomware on Android that locks the screen with FBI logos
  • Fake security alerts that redirect users to tech support scams

These threats do not function like the original ransomware, but they use the same pressure tactics and are often combined with phishing, payment fraud, and identity theft.

Remove the FBI Virus with Malwarebytes (Recommended)

The most effective way to remove an FBI virus infection is to scan your device with a trusted anti malware tool. We recommend using Malwarebytes because it specializes in removing ransomware, adware, browser hijackers, and potentially unwanted programs. Manual removal may not detect hidden files or startup entries, so using an automated scanner is the safest option.

Follow these steps to remove the FBI virus using Malwarebytes:

mbsetup

  1. Download Malwarebytes and save the installer to your Downloads folder. Double click it to begin installation.

install malwarebytes

  1. Follow the on screen instructions to install Malwarebytes on your Windows device.

choose your protection type

  1. Select whether you are installing Malwarebytes for personal or business use and click Next.

malwarebytes browser guard

  1. You may be offered Malwarebytes Browser Guard. You can add it or skip this step.

malwarebytes get started

  1. Once installation is complete, open Malwarebytes and click Get Started.

malwarebytes all in one protection

  1. If using the free version, you will receive a trial of Malwarebytes Premium. After the trial ends, the program continues working as an on demand scanner.

malwarebytes scan

  1. From the dashboard, click Scan. Malwarebytes will check memory, startup items, registry entries, and files for ransomware and related threats.

scanning for threats

  1. Wait for the scan to complete. This may take several minutes.

threats detected

  1. When the scan finishes, review the detected threats and click Quarantine to remove them. You may be prompted to restart your computer.

malwarebytes trusted advisor

  1. After rebooting, Malwarebytes may run additional checks to confirm your system is clean.

Manual Removal for Windows

If you still have access to your desktop or are dealing with a browser based FBI scam, these manual steps can help you remove unwanted components. Manual removal should be followed by a Malwarebytes scan to ensure no hidden remnants remain.

Step 1. Uninstall suspicious programs

  1. Right click Start and select Installed apps or Apps and Features.
  2. Sort by install date to locate recent additions.
  3. Uninstall programs you do not recognize or installed around the time the lock screen appeared.

Step 2. Remove browser notifications from fake FBI sites

  • Chrome: chrome://settings/content/notifications
  • Edge: Settings > Cookies and site permissions > Notifications
  • Firefox: Settings > Privacy and Security > Permissions

Step 3. Remove unwanted browser extensions

  • Chrome: chrome://extensions
  • Edge: Settings > Extensions
  • Firefox: about:addons

Step 4. Restore your default search engine

Restore Google, DuckDuckGo, or your preferred provider.

Step 5. Reset browser settings if symptoms continue

  • Chrome: chrome://settings/reset
  • Edge: Settings > Reset settings
  • Firefox: Help > More Troubleshooting Information > Refresh Firefox

Step 6. Clear cookies and site data

Remove cached FBI scam pages and redirects by clearing cookies and browsing data.

Step 7. Delete temporary files

Remove temporary files that may contain scripts or installers.

Advanced Checks for Persistent Issues

If you still see warnings or redirects, perform these advanced checks:

Check browser shortcuts

Right click your browser shortcut and ensure the Target field only contains the browser executable path.

Check Windows hosts file

Inspect C:\Windows\System32\drivers\etc\hosts for unwanted entries.

Check proxy and DNS settings

Ensure no unexpected proxies or DNS servers are configured.

Check Chrome policies

Visit chrome://policy to see if malware has enforced settings.

Review Task Scheduler

Look for tasks that launch unknown executables.

For more malware removal guides and cybersecurity alerts, visit our latest updates in the malware category.

Sean Doyle

Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.

Post navigation

  • Pingback: FBI “Ransomware” Virus: A Nasty Intruder | SiteProNews: Webmaster News & Resources
  • PS. Just wanted to say thanks Sean for the very informative and easy to follow step by step instructions you had. your leave a comment area had some issues in the name and email area so I had to reply to my original post. Thanks again, scott g.

  • I got the FBI ransome trojan ($200 fine ver) while clicking on a video link about justin beber and selina gomez breakup on or about 1130am 11/10/12. it locked up my pc pretty hard. good thing I have another laptop available to research the virus. found your site and did a systems restore from safe mode that brought back functionality to the infected pc. I am now running full scans with MS security essentials, spybot, and malwarebytes. It appears the virus is gone but I will keep an eye on things for a while just to be sure.

  • Pingback: Why yes, malware can make your webcam spy on you - Jennifer Ellis, JD
  • Pingback: How To Remove The FBI Virus (FBI Moneypak Ransomware Virus) – Fake FBI Malware Removal | Botcrawl.com | infotechcomputing
  • Just had the pleasure of looking at this FBI virus, didn’t have a way to look it up online so I had to find it myself, Boot to safe mode + command prompt, open regedit, navigated to HKEY_CURRENT_USER\Software\Microsoft\WindowsNT\Winlogon
    (I’ve had a fake antivirus do this to me before)

    Found an entry that was modified:
    Name: shell
    Type: REG_SZ
    Changed value: explorer.exe, C:\Users\****\AppData\Local\(Random).exe

    I changed the value back to explorer.exe and reboot…

    For those who don’t know the registry much, this entry is the “On log on” program launcher, as soon as your user has been authenticated (either clicked or user/password is correct), windows runs what programs are specified in this entry.

    If you try to manually remove the virus don’t forget to check this location

  • Pingback: How To Remove The FBI Virus (FBI Moneypak Ransomware Virus) – Fake FBI Malware Removal | Botcrawl.com | infotechcomputing
  • Got this virus a day ago on my Windows 7 XP version…after much searching I ran Norton NPE Crimeware virus software in Safemode. The installation required a shutdown and restart. After restart I accepted the license and ran the software. The software noted that file: dtresfflsceez.exe was running in my startup menu and was considered a virus. Engaged the removal feature and clicked continue. The file was removed successfully. Restarted my machine and ran a Quick scan and located additional tracking cookies. Removed the cookies, shutdown the machine and ran an additional full scan. All is working now…I hope this helps someone.

  • This virus is getting me tons of business for my PC repair side job. Though it does seem to be dying down, now I’m seeing more of the File Recovery, File Restore, etc virus.

    Something like this literally can take 2 minutes to remove if you have a way to get outside windows and see the files on your PC.

    Program Data, and user > App Data > Local are the main folders I find these in.

  • I ended up backing up my photos/videos to another hard drive in safe mode and then reformatted my harddrive. Im about to find this little pukehead who created this so called fbi virus where he’s living at.

  • Pingback: Compute: Virus demands a ransom to free your computer | Trojan Removal Software
  • Got it this morning. I rebooted and scandisk started. I deleted temp files and that seemed to take care of it. Also ran a virus scan afterwards. Nothing found

  • I just got hit with this virus 2 days ago. Locked up pretty bad. Older PC w/ Windows XP Pro. Could not enter safe mode of any kind so could not manually delete virus files. I have Malwarebytes(TM)but i could not get most recent updates. I did scan with older version but PC shut down before completion (MWBTS found infection but could not finish delete on restart). I disconnected router and sat there very pissed. Then I reconnected router, turned on PC normally and was able to click on MWBTS icon on desktop before FBI virus could take over. Updated MWBTS and started full scan (will take at least 2-3 hours)and as sooon as scan was running, disconnected router and deleted virus after scan. Then ran quick scan and full scan again to be sure. 0 malicious items. All seems well. Think I will stop using IEX and use Firefox from now on. I’ve read that FF w/ NoScript addon is safer. Good luck fellow surfers!

  • I disabled this virus by using safe mode and then typing ‘regedit’ into the bar and hitting enter. Then, I was able to find an unknown program in the Startup programs. From there, I disabled it and it does not run anymore. However, it is still there. It just doesn’t appear anymore.

    • It is still a fake. If you can get the number from caller id or something call them back and tell them you are from MI6 or Interpol or something and that they should stay in their house and wait for the police to arrive. Be as creative as the hackers.I was once called by some Idiots claiming to be the FBI who wanted a credit card. I gave them the real phone number of the local FBI office (and a fake credit card) I would love to have seen their faces if they called. Remember, remember, the FBI, no matter what you may have heard does not collect fines. 2)This virus like many others is really a family of viruses (even if the screens look the same or similar) and like any virus it is constantly mutated. That’s why it’s so hard to stop. Get good anti virus software. Keep it up to date. Read up and learn how to cope with thse bastards. Otherwise, relax, pour yourself a nice glass of scotch and get to work.

  • Pingback: FBI Ransonware Virus | Microsoft Office Information
  • Pingback: Internet FBI Scam
  • this is helpful:) when i first saw the FBI page i litterally started crying because i really thought i had to pay $200 for my fine or i had to be sent to jail for 3 years.(i still a teen!) But till’ i went on google and searched how to Remove FBI moneypak and founded results, you wouldnt believe how happy and glad i was for google and this page! :’) tears of JOY

  • Thanks for the manual clean up instructions. I was able to find and remove the ctfmon file easily in safe mode with networking enabled. However, after a lot of trail and error with Vista, I finally found the appdate/local/temp file folder but could not find the listed files to remove in this location. I then started into a really protracted effort to do a system restart using accessories/system tools/system restart. I probably initiated restart at least a half dozen times and it always stopped with a disk error message that I assumed was caused by one of the malware files. I also was able to start and run McAfee virsus scan after removing the ctfmon file. After the virus scan was complete (it indicated no virus present) I was able to do a disk recovery operation which took overnight to complete. In the morning, I was finally able to do a system recovery going back to a date I knew for certain I did not have this malware. I hope the rotten a-holes that invented this virus do many years in jail and are banned from life from owning any further computer equipment.

    This is my second experience with malware and both times its was immediately obvious the page that popped up was bogus. The FBI would never be involved with this type of shake down regardless of what people believe about the US Government and its actions. The previous experience was with the MS Security malware. Both have been a real pain to remove.

    This site is the absolute best of the sites I looked through on removal. It had easy to follow instructions and did not require buying more conflicting software to resolve the problem. Wish the site was listed first when browsing. It would have saved a fair amount of time as other sites were selling malware software without assurance of success.

  • GONE in 30 seconds! I had only 1 user account with Norton360 and the FBI bug apparently got by that. I went with option 4 . . . removed the “ctfmon” file then restarted normally. Everything appears back to normal. Couldn’t have been easier. To be safe, I started a 2nd ADMIN log-on and downloaded and ran malwarebytes from that profile. It found 2 infected files which were removed. After mandatory restart, I switched back to normal account and ran malwarebytes again . . . all clean. Thanks, saved me a $150 geek squad fee!!!

  • I got the virus on 2 computers within minutes of eachother, all I was doing was deleting junk mail. I simply restored the Dell laptop to its birthdate and the Sony simply restored it to a few months ago. I did not have to use safe mode, just had to turn of my wireless router. Both are back to normal now. In both cases, my expired Norton anti virus pop up popped up wanting me to renew, hmmm.

  • Pingback: Ransomware – FBI Moneypak SOPA virus as samples of malware to beware of
  • So, I got hit with this piece of crap virus. BEST WAY to get rid of it…TRUST ME…First, hopefully you have a second user on your PC . Always set up a back door sign in as ADMIN. Dont use it unless you really need to….LIKE NOW !!!! Go to the web and bring down MALWARE BYTES. Its free but it is a TRIAL VERSION. Activate it through your alternate sign on, not the user that you contracted the virus under – you wont be able to anyway because of the “FBI LOCKOUT” Run the clean up twice. I bought the ultimate for $39.00 and boy was it worth it. Once you have run the complete application you can sign on as normally do. THEN RUN IT UNDER THE USER THAT ORIGINALLY GOT STUCK UP THE BUT WITH THE VIRUS. It will clean the files that are not shared as the user that was infected. Total time to fix this once you down load Malwarebytes is about 30 minutes. SO….SCREW FBI-$200.00 By the way, I didnt mention that I have Norton 360 and Windows invader running. This virus has an awfully long and thin needle

  • Thank you sooooo much!!! I freaked out when i got the FBI warning but with this instructions it was easy to remove ! I didnt have access to safe mode but to the safe mode with command prompt! Then it took me 5 minutes and the virus was gone! It seemed so easy, i hope everything is gone! But not to take any risks i guess i will reinstall windows again! Should i? Thank you again sooo much this was soooo helpful an easy!

    • Thank YOU!!! I don’t even know how to download illegal stuff. I’ve been paying for everything like a sap, so I FREAKED when this message came up. I was right in the middle of writing a 25 page paper for my Masters classes and hadn’t backed up to Dropbox. Safe mode with Command Prompt, Explorer, system restore. end of story. Awesome!!!

  • Thaks for the solutions. I tried all the manula steps but didn’t find the files as specified.Then installed Malwarebytes and it removed the virus. Thanks again for this information.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.