Reveton Ransomware: The “Police Trojan” That Popularized Scare Tactics in Ransomware Attacks

Reveton ransomware, often referred to as the “Police Trojan”, was a screen-locking ransomware campaign that emerged in 2012, infamous for impersonating law enforcement agencies. It displayed fake legal warnings on the victim’s screen, falsely accusing users of crimes such as copyright violations or viewing illegal content, and demanded a ransom payment, typically in prepaid cards or cryptocurrency, to unlock their systems.

Introduction to Reveton Ransomware

Reveton was one of the first widespread examples of ransomware that used social engineering and fear rather than data encryption to extort payments from victims. Once installed, it locked the computer screen and displayed a full-screen message claiming to be from law enforcement agencies like the FBI, Interpol, or local police, demanding a “fine” for alleged illegal activities. Victims were threatened with arrest or prosecution if they didn’t pay immediately.


1. How Reveton Ransomware Worked

Infection Mechanism:

Locking Process and Ransom Demand:


2. History and Notable Campaigns

Origin and Discovery:

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:

Consequences:


4. Technical Details

Payload Capabilities:

Common Message Examples:


5. Preventing Reveton Ransomware Infections

Best Practices (Then and Now):

Recommended Security Tools:


6. Detecting and Removing Reveton

Indicators of Compromise (IoCs):

Removal Steps:

  1. Boot into Safe Mode with Networking, if possible.
  2. Use malware removal tools (e.g., Malwarebytes Anti-Malware, Kaspersky Rescue Disk) to detect and remove the malware.
  3. Restore registry entries and default Windows shell if they’ve been altered.
  4. Update antivirus software and run a full system scan to ensure no additional malware is present.
  5. If necessary, restore from a clean backup or perform a system restore to a point before the infection.

Professional Help:
For persistent infections, professional IT support or cybersecurity experts may be necessary to fully clean the system and recover access.


7. Response to a Reveton Attack

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:

Ethical Considerations:


9. Resources and References


10. FAQs about Reveton Ransomware

Q: What is Reveton ransomware?
Reveton is a screen-locking ransomware that impersonates law enforcement agencies to coerce victims into paying a ransom to unlock their computers.

Q: How did Reveton spread?
It was primarily delivered through exploit kits on compromised websites, as well as phishing emails containing malicious attachments or links.

Q: Can Reveton ransomware be removed?
Yes, Reveton can often be removed using malware removal tools and Safe Mode recovery options, without paying the ransom.


11. Conclusion

Reveton ransomware was a pioneering example of screen-locking ransomware, leveraging fear and deception to extort payments from unsuspecting victims. While its law enforcement impersonation tactics have been widely imitated, modern cybersecurity practices and user education have made these schemes less effective today—but they remain a valuable case study in the evolution of ransomware threats.

 

 

« Back to the Virus Information Library

« Back to the Security Center