This article provides information about Blood Jaws as well as instructions on how to remove it completely from the system.
Blood Jaws ransomware is ransomware created and released by Virus Express. It appears to behave like an educational ransomware that aims to demonstrate you the devastating consequences of a real ransomware attack. For now files encrypted by Blood Jaws could be decrypted for free. However, it may not take long until hackers obtain the source code of the threat and implement modifications in order to start blackmailing victims into paying a ransom for encrypted data. In case that this ransomware has somehow gained access to your PC, you need to remove all files and objects associated with it as soon as possible.
|Short Description||A data locker ransomware that utilizes strond cihper algorithm to encrypt files on stored on the infected computer. For now decryption solution is available for free.|
|Symptoms||The information stored by corrupted files remains inaccessible until their code is restored to its normal state. A ransom note provides more infromation about the infection.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by Blood Jaws |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Blood Jaws.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Blood Jaws Ransomware – Distribution
The infection process with this Blood Jaws ransomware version begins after the execution of its payload on the system. For the distribution of this malicious payload, hackers bet on various shady techniques. All of the implemented spread techniques are designed to trick you into opening the payload on your PC.
One of the most preferred ways for ransomware distribution is through email spam messages. Bad actors spoof the email address and sender hoping that you will follow the instructions they provide in the text message. So often emails carriers of ransomware and other malware infections present the names of representatives of legitimate services like your favorite website or your internet provider, any logistics company, your bank or even any governmental institution. Their text messages usually are designed in a way that provokes sense of urgency so that you are more likely to interact with the corrupted elements immediately. As for these elements, they could be either attached files of various types (Microsoft Office files, PDFs, images, etc.) or clickable in-text links. A single interaction with any of the provided compromised elements results in automatic download of the ransomware to your system.
When the malware code is obfuscated in another seemingly secure file you start the infection process when you open the file on your machine. In case that the email presents only a clickable link this link could be set to land you on a compromised web page that by the help of malicious scripts could download the ransomware code directly on the device.
For the sake of your security, before you open a dubious file on your PC you could use a free online file extractor to check the security level of the file. Tools of this kind scan the code of each uploaded file for specific malicious traits. After, the scan you could see whether the uploaded file contains malicious elements or not. The information could help you to refrain from opening corrupted files on your PC.
Blood Jaws Ransomware – Overview
Blood Jaws is a ransomware that uses the sophisticated AES cipher algorithm to encrypt important files and leave them out of order. Unlike the majority of the threats of this kind, Blood Jaws does not append a specific file extension to corrupted files. So they could only be recognized when you attempt to view the content they store. Once encrypted a file remains broken until an efficient decryption solution reverts back their original code.
For now Blood Jaws seems to be harmless due to the fact that along with all infectious files its installer drops a file called bloodjaws.exe that is considered to work as a decryption solution. However, the creators of the threat may change their initial opinion and start to blackmail victims into paying a ransom for the decryption solution. Furthermore, some malicious intenders could obtain the source code of threat and then change the free decryption option to a paid one.
It is also possible that Blood Jaws has crappy code that is able damage target files but unable to generate working decryption key. As regards files targeted by the ransomware, the list may include documents, images, photos, videos, text files, archives, backups, and other.
Following encryption, this crypto virus drops a ransom note file to inform victims about its presence and impact. The note displays the following message:
Your personal files have been encrypted.
All images, videos, music, documents and executables on this PC have been encrypted by Blood Jaws ransomware.
To decrypt your files, locate and run the Blood Jaws decryption program. It is called ‘bloodjaws.exe’. Decryption is free.
Do not delete the Blood Jaws Decryption program if you want to be able to decrypt your computer.
Uninstall your antiviruses as they may try to uninstall the Blood Jaws Decryption program which is your only way of saving your PC.
Another message is contained in a file named readme.txt and all it reads is:
Blood Jaws ransomware
Blood Jaws is ransomware!
Run at your own risk. Run ‘runme.exe’ if you really want to kill your PC.
I am not responsible for any damage done.
Tested on Windows 10 (64)
Virus made by Virus Express.
AES 256 Bit Encryption used with the password: bloodjawsencryptionl23!@:
Remove Blood Jaws Ransomware and Restore Files
The removal of Blood Jaws ransomware demands a bit of technical experience and ability to recognize traits of malware files. And there is no doubt that you should remove this nasty threat from the infected PC as soon as you detect it. Otherwise, it has the chance to spread its infection files among the whole network. Below you could find how to remove it step by step. Beware that ransomware has highly complex code that could plague not only your files but your whole system. So as recommended by security researchers you need to utilize an advanced anti-malware tool for its complete removal. Such tool will keep your system protected against devastating threats like Blood Jaws and other kinds of malware that endanger your online security.
In case that you look for alternative methods to restore corrupted files make sure to check the “Restore Files” step listed in the guide below. But before you take any further actions, don’t forget to back up all encrypted files to an external drive in order to prevent their irreversible loss.