The FBLocker virus is a new malware that does not originate from any of the known malware families. The collected samples so far are test versions and we expect to see forthcoming attacks with it. The virus engine encrypts target user data with the .facebook extension, read our removal guide for further information on deleting active infections.
|Short Description||The ransomware encrypts sensitive information on your computer system with the .facebook extensions and demands a ransom to be paid to allegedly recover them.|
|Symptoms||The ransomware will encrypt your files with a strong encryption algorithm.|
|Distribution Method||Spam Emails, Email Attachments|
See If Your System Has Been Affected by malware
Malware Removal Tool
|User Experience||Join Our Forum to Discuss FBLocker.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
FBLocker Virus – Distribution Ways
FBLocker virus is an example of a malware that uses the typical virus delivery tactics. At this point there is no information about the preferred method because of the small size of the attacks. As such we assume that the most popular methods are going to be used.
An example attack can facilitate email messages that make use of social engineering tactics in order to manipulate the victims into interacting with the threat. Usually the preferred way for the hackers behind the FBLocker virus is to create messages that use text and graphics from well-known sites and services and attempt to scam the targets into opening a dangerous file. From its name we can assume that the probable victim would be Facebook. Usually the virus files are either attached or hyperlinked in the body contents of the emails. They are also among the most common methods for delivering virus-infested payloads. Two of the most often used types are the following:
- Software Installers — The criminals bundle the dangerous code in application installers of popular applications: productivity suites, creative utilities, system optimization solutions or computer games. This is done by taking the legitimate files from the official download site and modifying them with the dangerous code. They are then uploaded to various hacker-controlled sites, P2P networks and other distribution channels.
- Documents — The same mechanism can be used with documents of different types: rich text documents, spreadsheets or presentations. The embedded scripts launch a notification prompt that asks the victims to enable the built-in scripts. If this is done the virus will be downloaded from a remote server and the infection follows.
The hackers behind the FBLocker virus can also employ browser hijackers that represent malware browser extensions. They are often made compatible with the most popular web browsers: Mozilla Firefox, Google Chrome, Internet Explorer, Microsoft Edge, Safari and Opera. The hackers use elaborate descriptions and fake user reviews and developer credentials in order to advertise it on the relevant software plugin repositories.
Using various web scripts the threat can be delivered to legitimate and popular sites as well. This is done using all manners of banners, pop-ups and redirects.
FBLocker Virus – In-Depth Analysis
The FBlocker appears to be an original creation of the hacker or criminal collective behind the threat. The initial security analysis does not reveal any correlation with any of the famous malware families.
The virus files taken the name svchost and MicrosoftWindowsOperating System in order to mask their appearance from the users. Following the security examination it appears that it is still under development. We expect to see further updates in the forthcoming attacks.
So far the engine does not seem to execute an initial infiltration step. In future versions it may launch a data harvesting module that is programmed to gather their personal information. The type of data that is being harvested can reveal the identity of the victims by hijacking their name, address, telephone number, interests, location, passwords and account credentials. In connection with this the harvested data can be fed to a stealth protection mechanism. It uses the acquired information in order to scan for applications that can interrupt the correct execution of the virus. This includes all manners of anti-virus software, virtual machine hosts or debug/sandbox environments. In certain cases the malware may be instructed into deleting itself to avoid detection if it is not able to bypass this step.
After this is done the next step may be the institution of various system changes. Depending on the exact configuration this can lead to Windows Registry entries modification. When done against the operating system and user-installed applications strings the victims may be unable to start certain functions and will experience performance issues. The Windows registry is also used to lead to a persistent state of execution which starts the FBLocker virus every time the computer is booted. The system changes induced by the threat can also lead to the removal of Shadow Volume Copies which makes it very difficult to recover the data without the use of specialized software, refer to our guide below.
Considering that the FBLocker virus may be updated in the future we suspect that the next versions might include a
FBLocker Virus – Encryption Process
The ransomware component is launched once all preliminary components have finished execution. It uses a custom cipher in order to affect the target data which is chosen based on a built-in list of target file types. An example list includes the following targets:
As a result of the encryption engine all victim files are renamed with the .facebook extension. A sample ransom note (that can have many names and extensions) reads the following:
What Happened to My Computer?
Your important files are encrypted. Many of your documents, photos, videos, databases and other files are no longer accessible because they have been encrypted. Do not waste your time looking for a way to recover your files. Nobody can recover your files.
Can I Recover My Files?
No. My name is Mark Zuckerberg and I have encrypted your files without saving any encryption keys. I appreciate you executing my program because you have allowed me to ruin more lives.
“A squirrel dying in front of your house may be more relevant to your interests right now than people dying in Africa.”
Remove FBLocker Virus and Restore .FBLocker Files
If your computer system got infected with the FBLocker ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.
- Guide 1: How to Remove FBLocker from Windows.
- Guide 2: Get rid of FBLocker on Mac OS X.
- Guide 3: Remove FBLocker in Google Chrome.
- Guide 4: Erase FBLocker from Mozilla Firefox.
- Guide 5: Uninstall FBLocker from Microsoft Edge.
- Guide 6: Remove FBLocker from Safari.
- Guide 7: Eliminate FBLocker from Internet Explorer.
- Guide 8: Disable FBLocker Push Notifications in Your Browsers.
How to Remove FBLocker from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove FBLocker
Step 2: Uninstall FBLocker and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it.
Step 3: Clean any registries, created by FBLocker on your computer.
The usually targeted registries of Windows machines are the following:
You can access them by opening the Windows registry editor and deleting any values, created by FBLocker there. This can happen by following the steps underneath:
Get rid of FBLocker from Mac OS X.
Step 1: Uninstall FBLocker and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove FBLocker via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove FBLocker files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as FBLocker, the recommended way of eliminating the threat is by using an anti-malware program. SpyHunter for Mac offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Remove FBLocker from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Erase FBLocker from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Uninstall FBLocker from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Remove FBLocker from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the FBLocker will be removed.
Eliminate FBLocker from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.
Remove Push Notifications caused by FBLocker from Your Browsers.
Turn Off Push Notifications from Google Chrome
To disable any Push Notices from Google Chrome browser, please follow the steps below:
Step 1: Go to Settings in Chrome.
Step 2: In Settings, select “Advanced Settings”:
Step 3: Click “Content Settings”:
Step 4: Open “Notifications”:
Step 5: Click the three dots and choose Block, Edit or Remove options:
Remove Push Notifications on Firefox
Step 1: Go to Firefox Options.
Step 2: Go to “Settings”, type “notifications” in the search bar and click "Settings":
Step 3: Click “Remove” on any site you wish notifications gone and click “Save Changes”
Stop Push Notifications on Opera
Step 1: In Opera, press ALT+P to go to Settings
Step 2: In Setting search, type “Content” to go to Content Settings.
Step 3: Open Notifications:
Step 4: Do the same as you did with Google Chrome (explained below):
Eliminate Push Notifications on Safari
Step 1: Open Safari Preferences.
Step 2: Choose the domain from where you like push pop-ups gone and change to "Deny" from "Allow".