This article provides information about Blood Jaws as well as instructions on how to remove it completely from the system.
Blood Jaws ransomware is ransomware created and released by Virus Express. It appears to behave like an educational ransomware that aims to demonstrate you the devastating consequences of a real ransomware attack. For now files encrypted by Blood Jaws could be decrypted for free. However, it may not take long until hackers obtain the source code of the threat and implement modifications in order to start blackmailing victims into paying a ransom for encrypted data. In case that this ransomware has somehow gained access to your PC, you need to remove all files and objects associated with it as soon as possible.
|Short Description||A data locker ransomware that utilizes strond cihper algorithm to encrypt files on stored on the infected computer. For now decryption solution is available for free.|
|Symptoms||The information stored by corrupted files remains inaccessible until their code is restored to its normal state. A ransom note provides more infromation about the infection.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by Blood Jaws |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Blood Jaws.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Blood Jaws Ransomware – Distribution
The infection process with this Blood Jaws ransomware version begins after the execution of its payload on the system. For the distribution of this malicious payload, hackers bet on various shady techniques. All of the implemented spread techniques are designed to trick you into opening the payload on your PC.
One of the most preferred ways for ransomware distribution is through email spam messages. Bad actors spoof the email address and sender hoping that you will follow the instructions they provide in the text message. So often emails carriers of ransomware and other malware infections present the names of representatives of legitimate services like your favorite website or your internet provider, any logistics company, your bank or even any governmental institution. Their text messages usually are designed in a way that provokes sense of urgency so that you are more likely to interact with the corrupted elements immediately. As for these elements, they could be either attached files of various types (Microsoft Office files, PDFs, images, etc.) or clickable in-text links. A single interaction with any of the provided compromised elements results in automatic download of the ransomware to your system.
When the malware code is obfuscated in another seemingly secure file you start the infection process when you open the file on your machine. In case that the email presents only a clickable link this link could be set to land you on a compromised web page that by the help of malicious scripts could download the ransomware code directly on the device.
For the sake of your security, before you open a dubious file on your PC you could use a free online file extractor to check the security level of the file. Tools of this kind scan the code of each uploaded file for specific malicious traits. After, the scan you could see whether the uploaded file contains malicious elements or not. The information could help you to refrain from opening corrupted files on your PC.
Blood Jaws Ransomware – Overview
Blood Jaws is a ransomware that uses the sophisticated AES cipher algorithm to encrypt important files and leave them out of order. Unlike the majority of the threats of this kind, Blood Jaws does not append a specific file extension to corrupted files. So they could only be recognized when you attempt to view the content they store. Once encrypted a file remains broken until an efficient decryption solution reverts back their original code.
For now Blood Jaws seems to be harmless due to the fact that along with all infectious files its installer drops a file called bloodjaws.exe that is considered to work as a decryption solution. However, the creators of the threat may change their initial opinion and start to blackmail victims into paying a ransom for the decryption solution. Furthermore, some malicious intenders could obtain the source code of threat and then change the free decryption option to a paid one.
It is also possible that Blood Jaws has crappy code that is able damage target files but unable to generate working decryption key. As regards files targeted by the ransomware, the list may include documents, images, photos, videos, text files, archives, backups, and other.
Following encryption, this crypto virus drops a ransom note file to inform victims about its presence and impact. The note displays the following message:
Your personal files have been encrypted.
All images, videos, music, documents and executables on this PC have been encrypted by Blood Jaws ransomware.
To decrypt your files, locate and run the Blood Jaws decryption program. It is called ‘bloodjaws.exe’. Decryption is free.
Do not delete the Blood Jaws Decryption program if you want to be able to decrypt your computer.
Uninstall your antiviruses as they may try to uninstall the Blood Jaws Decryption program which is your only way of saving your PC.
Another message is contained in a file named readme.txt and all it reads is:
Blood Jaws ransomware
Blood Jaws is ransomware!
Run at your own risk. Run ‘runme.exe’ if you really want to kill your PC.
I am not responsible for any damage done.
Tested on Windows 10 (64)
Virus made by Virus Express.
AES 256 Bit Encryption used with the password: bloodjawsencryptionl23!@:
Remove Blood Jaws Ransomware and Restore Files
The removal of Blood Jaws ransomware demands a bit of technical experience and ability to recognize traits of malware files. And there is no doubt that you should remove this nasty threat from the infected PC as soon as you detect it. Otherwise, it has the chance to spread its infection files among the whole network. Below you could find how to remove it step by step. Beware that ransomware has highly complex code that could plague not only your files but your whole system. So as recommended by security researchers you need to utilize an advanced anti-malware tool for its complete removal. Such tool will keep your system protected against devastating threats like Blood Jaws and other kinds of malware that endanger your online security.
In case that you look for alternative methods to restore corrupted files make sure to check the “Restore Files” step listed in the guide below. But before you take any further actions, don’t forget to back up all encrypted files to an external drive in order to prevent their irreversible loss.
How to Remove Blood Jaws from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove Blood Jaws
Step 2: Uninstall Blood Jaws and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it.
Step 3: Clean any registries, created by Blood Jaws on your computer.
The usually targeted registries of Windows machines are the following:
You can access them by opening the Windows registry editor and deleting any values, created by Blood Jaws there. This can happen by following the steps underneath:
Step 4: Scan for Blood Jaws with SpyHunter Anti-Malware Tool
Step 5 (Optional): Try to Restore Files Encrypted by Blood Jaws.
Ransomware infections and Blood Jaws aim to encrypt your files using an encryption algorithm which may be very difficult to decrypt. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.
If the above link does not work for you and your region, try the other two links below, that lead to the same product:
Get rid of Blood Jaws from Mac OS X.
Step 1: Uninstall Blood Jaws and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove Blood Jaws via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove Blood Jaws files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as Blood Jaws, the recommended way of eliminating the threat is by using an anti-malware program. Combo Cleaner offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Step 3 (Optional): Try to Restore Files Encrypted by Blood Jaws on your Mac.
Ransomware for Mac Blood Jaws aims to encode all your files using an encryption algorithm which may be very difficult to decode, unless you pay money. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files, but only in some cases. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.