Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Buma Stemra Ransomware Virus – Removal Instructions

NameBuma Stemra
TypeRansomware, Trojan
Short DescriptionA winlocker type of ransomware preventing access to user PC.
SymptomsLocks the screen out and demands a 50 euro ransom. The ransom note is in Dutch and has the Dutch police and Buma Stemra logos in it.
Distribution MethodExploit Kits. Spam Mail Campaigns, Malicious Redirects, Spoof Mails
Detection toolDownload Malware Removal Tool, to See If Your System Has Been Affected By Buma Stemra
User ExperienceJoin our forum to follow the discussion about Buma Stemra.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

buma-stemra-virusBeware, virus infections have increased, concerning a ransomware trojan, resembling the Dutch legitimate music rights protection organization Buma Stemra. Compared to the malicious virus that infects the user’s files and displays fear-inducing messages to average computer users in different languages (mainly in Dutch), the organization is concerned with protecting the rights of musicians by targeting file-sharing sites. What the virus does is use that very credibility to ‘convict’ the user into violating copyright law. It displays a message with the police logo as well as Buma Stemra’s logo on the user PC and completely locks the user out of their device, asking for ransom money, which is usually within 50 euros.

Buma Stemra Ransomware – How To Get Infected?

Cyber criminals have realized over the years that the most successful virus is not the one that remains undetected or does a great deal of damage because nowadays most viruses can do that. No, they have clearly understood that the most successful threat is the one that has affected the greatest amount of devices. This is why they embed viruses, like Buma Stemra in malicious links that may be advertised in various ways, primarily via mail. Such can be email spamming and spoofing campaigns, for example.

One particularly effective method is by a malicious redirect. Imagine you have a PUP on your computer, like Qvo6.com browser hijacker for example. It may suddenly open a pop-up linking to a malicious site that may download the malware directly onto your computer. This method of infection is called a drive-by download.

Another way to get infected by a malicious web link is by clicking on a suspicious Facebook post. Most Facebook viruses feature posts with viral videos, luring users into downloading fake Flash Player or Youtube plugins to watch a video. Such plugins may contain the malware, so do not download any suspicious plugins. Always check the source with website checkers, such as Norton safe web, for example.

More about the Buma Stemra Virus

Unlike most ransomware infections that encrypt important user files, this ransomware belongs to a group, called ‘winlockers’. It essentially locks users completely out of their computers, using different objects that modify Windows settings. Since it locks the user out, some experts believe that it may be interacting with the screensaver of the device it affects in some way. This way, it may be able to be effective even if the computer is disconnected.

More so, this virus uses a message primarily in dutch, and if you are from another country and get it, you will become very frustrated and curious as to what is this. Similar to other rasnomware viruses, the instructions for payment may include anonymous networking and the usage of Ukash service to pay.

When you see this virus, make sure not to panic. Police Ransomware type of viruses is easy to spot because no actual law enforcement agency will want anonymous payment from the user via a service. More importantly no law enforcement agency will lock users out of their computer. Simply read the instructions below to see how easy it is to remove it with an advanced anti-malware program in offline mode.

Removing Buma Stemra Ransomware

An important thing to consider is to not to try to remove it while you have booted in everyday use Windows mode and were online, because it may initiate scripts that may either lock the user further out or even crash the computer and destroy data. This could be done by scripts from files on the computer that act as a ‘fail-safe’ for cyber-criminals. Security experts recommend removing it with an advanced anti-malware program that will look for malicious files in critical locations such as the Windows Registry Editor, %appdata%, %temp%, system32 and others.

To do this, you should isolate the threat first by booting in Safe Mode with no networking. Then, you should download on a USB stick from a safe PC a particular anti-malware program that will remove the Buma Stemra Virus and all associated files completely from your PC. After you install the updated anti-malware, you should scan your computer, and you may be all set. Also, after removing it, you should protect your files by backing them up and enabling Windows defense features. For more information on how to protect your files, boot in Safe Mode and scan your computer to remove Buma Stemra completely, please review the tutorial below:

Step 1: Start Your PC in Safe Mode to Remove Buma Stemra.

Removing Buma Stemra from Windows XP, Vista, 7 systems:

1. Remove all CDs and DVDs, and then Restart your PC from the “Start” menu.
2. Select one of the two options provided below:

For PCs with a single operating system: Press “F8” repeatedly after the first boot screen shows up during the restart of your computer. In case the Windows logo appears on the screen, you have to repeat the same task again.

Capture

For PCs with multiple operating systems: Тhe arrow keys will help you select the operating system you prefer to start in Safe Mode. Press “F8” just as described for a single operating system.

safe-mode-windows

3. As the “Advanced Boot Options” screen appears, select the Safe Mode option you want using the arrow keys. As you make your selection, press “Enter“.

4. Log on to your computer using your administrator account

While your computer is in Safe Mode, the words “Safe Mode” will appear in all four corners of your screen.

Removing Buma Stemra from Windows 8, 8.1 and 10 systems:

Substep 1:

Open the Start Menu
Windows-10-0 (1)

Substep 2:

Whilst holding down Shift button, click on Power and then click on Restart.

Substep 3:

After reboot, the aftermentioned menu will appear. From there you should choose Troubleshoot.
Windows-10-1-257x300

Substep 4:

You will see the Troubleshoot menu. From this menu you can choose Advanced Options.
Windows-10-2 (1)

Substep 5:

After the Advanced Options menu appears, click on Startup Settings.
Windows-10-3 (1)

Substep 6:

Click on Restart.
Windows-10-5 (1)

Substep 7:

A menu will appear upon reboot. You should choose Safe Mode by pressing its corresponding number and the machine will restart and boot into Safe Mode so you can scan for and remove Buma Stemra.

Step 2: Remove Buma Stemra automatically by downloading an advanced anti-malware program.

To clean your computer you should download an updated anti-malware program on a safe PC and then install it on the affected computer in offline mode. After that you should boot into safe mode and scan your computer to remove all Buma Stemra associated objects.

NOTE! Substantial notification about the Buma Stemra threat: Manual removal of Buma Stemra requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

Security engineers recommend that you back up your files immediately, preferably on an external memory carrier in order to be able to restore them. In order to protect yourself from Buma Stemra (For Windows Users) please follow these simple instructions:

For Windows 7 and earlier:

Substep 1

-Click on Windows Start Menu
backup-1

Substep 2

-Type Backup And Restore
Substep 3-Open it and click on Set Up Backup
w7-backup3

Substep 4

-A window will appear asking you where to set up backup. You should have a flash drive or an external hard drive. Mark it by clicking on it with your mouse then click on Next.
backup-3

Substep 5

-On the next window, the system will ask you what do you want to backup. Choose the ‘Let Me Choose’ option and then click on Next.
backup-4

Substep 6:

-Click on ‘Save settings and run backup’ on the next window in order to protect your files from possible attacks by Buma Stemra.
backup-5

For Windows 8, 8.1 and 10:

Substep 1

-Press Windows button + R
filehistory-1

Substep 2

-In the window type ‘filehistory’ and press Enter
filehistory-2

Substep 3

-A File History window will appear. Click on ‘Configure file history settings’
filehistory-3

Substep 4

-The configuration menu for File History will appear. Click on ‘Turn On’. After its on, click on Select Drive in order to select the backup drive. It is recommended to choose an external HDD, SSD or a USB stick whose memory capacity is corresponding to the size of the files you want to backup.
filehistory-4

Substep 5

-Select the drive then click on ‘Ok’ in order to set up file backup and protect yourself from Buma Stemra.

Enabling Windows File Protection:

Substep 1

– Press Windows button + R keys.
sysdm

Substep 2

– A run windows should appear. In it type ‘sysdm.cpl’ and then click on Run.
windows-defense2

Substep 3

– A System Properties windows should appear. In it choose System Protection.
windows-defense3

Substep 4

– Click on Turn on system protection and select the size on the hard disk you want to utilize for system protection.

Substep 5

– Click on Ok and you should see an indication in Protection settings that the protection from Buma Stemra is on.
windows-defense1

Restoring a file via Windows Defense feature:

Substep 1

Right-click on the encrypted file, then choose Properties.
file-restore1

Substep 2

-Click on the Previous Versions tab and then mark the last version of the file.
file-restore2

Substep 3

-Click on Apply and Ok and the file encrypted by Buma Stemra should be restored.

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.