ICE Cyber Crime Center Virus Removal Guide

Do you know whatThe ICE Cyber Crime Center is?

The ICE Cyber Crime Center Virus is the latest ransomware infection that pretends to be associated with U.S. Immigration and Customs Enforcement (ICE) and the Department of Homeland Security. Like other ransomware infections, this threat, which is believed to be related to the Reveton Trojan, locks the computer down and displays a message containing the logos of various well-known products.

The Trojan presents a hoax message make you think that the notification on your screen is legitimate although it is just a means to deceive you into paying a fine of 400 American dollars. Unlike other ransomware infections, The ICE Cyber Crime Center ransomware presents MoneyPak which is required to be used for the money transaction.

Moreover, if you think that the following statements have to be taken into account, you are seriously mistaken:

The work of your computer has been suspended on the grounds of the violation of the law of the United States of America.

Possible violations are described below:

Article – 184. Pornography involving children (under 18 years) […]

Article – 171. Copyright […]

Article – 113. The use of unlicensed software[…]

Amount of the fine is $400. Payment must be paid within 48 hours after the computer blocking. If the fine has not been paid, you will become the subject of criminal prosecution without the right to pay the fine. The Department for the Fight Against Cyberactivity will confiscate your computer (after 48 hours)

In addition to the wording of the message, you should also pay no attention to the emblem of Interpol presented at the bottom. Additionally, such trademarks as ESET, F-Secure, McAfee, SOPHOS and other should be disregarded as well because they are presented to create an illusion that you are dealing with a serious case.

The truth is that the The ICE Cyber Crime Center infection is like other ransomware infections such as MoneyPak or Interpol Virus and Interpol Department Trojan as the only goal of these threats is to swindle unsuspecting computer users out of their money.

If you cannot decide whether to pay money or try to find another way to get out, we recommend that you remove ICE The ICE Cyber Crime Center using SpyHunter which is a powerful spyware removal program that can terminate various types of malware. The removal guidelines below will help you install our tool properly, and if you have any questions regarding the installation procedure, do not hesitate to leave you response in the comment box below.

ICE The ICE Cyber Crime Center Removal

Windows Vista/7

  1. Reboot the computer.
  2. Tap the F8 key as soon as the BIOS startup screen disappears in order to access the Boot Options menu.
  3. Using the arrow keys, select Safe Mode with Networking and press Enter.
  4. Go to http://www.spyware-techie.com/download-sph and download SpyHunter.
  5. Run the installer and scan the PC to remove ICE The ICE Cyber Crime Center.

Windows XP

  1. Restart the computer.
  2. Wait for the BIOS startup screen to disappear and start tapping the F8 key.
  3. In the Windows Advanced Options Menu, select Safe Mode with Networking (use the arrow keys) and press Enter.
  4. When a dialog box appears, click on Yes.
  5. Open the Start menu.
  6. Launch Run.
  7. Type “msconfig” in the Open box and press OK.
  8. Under the Startup tab, click on the Disable All button and select Apply.
  9. Download SpyHunter.
  10. Restart the computer.
  11. Run the installer and scan the PC for ICE The ICE Cyber Crime Center.

In non-techie terms:

The ICE Cyber Crime Center is a ransomware infection which pretends to be related to legal enforcement so that you fall into belief that the content of warning that is on your screen is reliable. We advise you to remove the infection immediately as the threat can corrupt the system by downloading new malware or damaging the system processes.

Aliases: ICE Virus.

  1. Install SpyHunter by double-clicking the downloaded file. Follow the on-screen instructions
  2. SpyHunter will automatically scan and detect threats