Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Kindest Ransomware Encrypts and Decrypts Files for Free

Ransomware was detected in the wild, known as the Kindest Ransomware ever which does not request victims to pay money to restore files encrypted by it. Instead the virus self-decrypts the files after it infects a computer. The purpose of the virus, according to it’s designers is to raise awareness on how ransomware works and how easy it is to get infected. It even lets victims watch a YouTube video which explains more on the ransomware subjects.

Threat Summary

Name

Kindest

Type Ransomware
Short Description Infects the computer, encrypts the files on it and them decrypts them for free, asking to watch an educational video.

Symptoms A skeleton wallpaper and a ransom note pointing to watch a youtube video.
Distribution Method Via an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by Kindest

Download

Malware Removal Tool

User Experience Join our forum to Discuss Kindest.
Data Recovery Tool Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Is Kindest Ransomware Distributed

It cannot be said with certainty what type of distribution techniques are used by Kindest ransomware virus. However one version is that it may be spread via web links posted online as comments on social media websites as well as web forums. Such links may usually lead to Google Drive or Dropbox accounts where the actual malicious files may be discovered. Since images from the ransom note of the virus are reported to be PirateBay inspired wallpapers, the virus may also be uploaded on torrent websites as well. Usually for such scheme to work, fake patches game cracks or key generators may be used for the infection with the Kindest Ransomware.

Kindest Ransomware Ever – More Information

Once this ransomware infection is on the infected computer the virus may immediately begin to encrypt files in it, rendering them no longer openable. As soon as this is done, the ransomware virus leaves a ransom note which looks like the following:

Ransom note text:

“Hello
Your computer has been infected by
the Kindest Ransomware ever.
we will not take your money or
anything else from you. we just want
you to be more aware of ransomwares
about how it works. Now watch this
video while we are doing everything
a ransomware does.
If you want to be more aware go to:
{YOUTUBE VIDEO LINK}”

The video to which the ransom note links is the following:

With time, malware researchers have successfully established that this ransomware infection is a part of the HiddenTear(http://sensorstechforum.com/decrypt-files-encrypted-hiddentear-ransomware-variants/) ransomware project that has it’s code uploaded as an open source code, meaning that anyone with programming skills can create a ransomware out of the code. The ransomware project (HiddenTear) was first created by Utku Sen, a Turkish coder who published the code online, creating an opportunity for many blackhat hackers to create different ransomware viruses(http://sensorstechforum.com/remove-8lock8-ransomware-decrypt-8lock8-files-free/).

Kindest Ransomware Ever – Conclusion

Since this ransomware virus represents no current threat what so ever, you should pay attention to the video sent by the cyber-criminals and not only this, but learn how to protect yourself and your computer by such ransomware viruses. For maximum protection on your computer, we strongly recommend you to focus on following the below-mentioned protection tips:

Advice 1: Make sure to read our general protection tips and try to make them your habit and educated others to do so as well.
Advice 2: Install an advanced anti-malware program that has an often updated real-time shield definitions and ransomware protection.

Download

Malware Removal Tool


Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter

Advice 3: Seek out and download specific anti-ransomware software which is reliable.

Advice 4: Backup your files using one of the methods in this article.

Advice 5: : Make sure to use a secure web browser while surfing the world wide web.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.