|Short Description||A winlocker type of ransomware preventing access to user PC.|
|Symptoms||Locks the screen out and demands a 50 euro ransom. The ransom note is in Dutch and has the Dutch police and Buma Stemra logos in it.|
|Distribution Method||Exploit Kits. Spam Mail Campaigns, Malicious Redirects, Spoof Mails|
|Detection tool||Download Malware Removal Tool, to See If Your System Has Been Affected By Buma Stemra|
|User Experience||Join our forum to follow the discussion about Buma Stemra.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Beware, virus infections have increased, concerning a ransomware trojan, resembling the Dutch legitimate music rights protection organization Buma Stemra. Compared to the malicious virus that infects the user’s files and displays fear-inducing messages to average computer users in different languages (mainly in Dutch), the organization is concerned with protecting the rights of musicians by targeting file-sharing sites. What the virus does is use that very credibility to ‘convict’ the user into violating copyright law. It displays a message with the police logo as well as Buma Stemra’s logo on the user PC and completely locks the user out of their device, asking for ransom money, which is usually within 50 euros.
Buma Stemra Ransomware – How To Get Infected?
Cyber criminals have realized over the years that the most successful virus is not the one that remains undetected or does a great deal of damage because nowadays most viruses can do that. No, they have clearly understood that the most successful threat is the one that has affected the greatest amount of devices. This is why they embed viruses, like Buma Stemra in malicious links that may be advertised in various ways, primarily via mail. Such can be email spamming and spoofing campaigns, for example.
One particularly effective method is by a malicious redirect. Imagine you have a PUP on your computer, like Qvo6.com browser hijacker for example. It may suddenly open a pop-up linking to a malicious site that may download the malware directly onto your computer. This method of infection is called a drive-by download.
Another way to get infected by a malicious web link is by clicking on a suspicious Facebook post. Most Facebook viruses feature posts with viral videos, luring users into downloading fake Flash Player or Youtube plugins to watch a video. Such plugins may contain the malware, so do not download any suspicious plugins. Always check the source with website checkers, such as Norton safe web, for example.
More about the Buma Stemra Virus
Unlike most ransomware infections that encrypt important user files, this ransomware belongs to a group, called ‘winlockers’. It essentially locks users completely out of their computers, using different objects that modify Windows settings. Since it locks the user out, some experts believe that it may be interacting with the screensaver of the device it affects in some way. This way, it may be able to be effective even if the computer is disconnected.
More so, this virus uses a message primarily in dutch, and if you are from another country and get it, you will become very frustrated and curious as to what is this. Similar to other rasnomware viruses, the instructions for payment may include anonymous networking and the usage of Ukash service to pay.
When you see this virus, make sure not to panic. Police Ransomware type of viruses is easy to spot because no actual law enforcement agency will want anonymous payment from the user via a service. More importantly no law enforcement agency will lock users out of their computer. Simply read the instructions below to see how easy it is to remove it with an advanced anti-malware program in offline mode.
Removing Buma Stemra Ransomware
An important thing to consider is to not to try to remove it while you have booted in everyday use Windows mode and were online, because it may initiate scripts that may either lock the user further out or even crash the computer and destroy data. This could be done by scripts from files on the computer that act as a ‘fail-safe’ for cyber-criminals. Security experts recommend removing it with an advanced anti-malware program that will look for malicious files in critical locations such as the Windows Registry Editor, %appdata%, %temp%, system32 and others.
To do this, you should isolate the threat first by booting in Safe Mode with no networking. Then, you should download on a USB stick from a safe PC a particular anti-malware program that will remove the Buma Stemra Virus and all associated files completely from your PC. After you install the updated anti-malware, you should scan your computer, and you may be all set. Also, after removing it, you should protect your files by backing them up and enabling Windows defense features. For more information on how to protect your files, boot in Safe Mode and scan your computer to remove Buma Stemra completely, please review the tutorial below:
Step 1: Start Your PC in Safe Mode to Remove Buma Stemra.
Removing Buma Stemra from Windows XP, Vista, 7 systems:
1. Remove all CDs and DVDs, and then Restart your PC from the “Start” menu.
– For PCs with a single operating system: Press “F8” repeatedly after the first boot screen shows up during the restart of your computer. In case the Windows logo appears on the screen, you have to repeat the same task again.
– For PCs with multiple operating systems: Тhe arrow keys will help you select the operating system you prefer to start in Safe Mode. Press “F8” just as described for a single operating system.
3. As the “Advanced Boot Options” screen appears, select the Safe Mode option you want using the arrow keys. As you make your selection, press “Enter“.
4. Log on to your computer using your administrator account
While your computer is in Safe Mode, the words “Safe Mode” will appear in all four corners of your screen.
Removing Buma Stemra from Windows 8, 8.1 and 10 systems:
Whilst holding down Shift button, click on Power and then click on Restart.
A menu will appear upon reboot. You should choose Safe Mode by pressing its corresponding number and the machine will restart and boot into Safe Mode so you can scan for and remove Buma Stemra.
Step 2: Remove Buma Stemra automatically by downloading an advanced anti-malware program.
To clean your computer you should download an updated anti-malware program on a safe PC and then install it on the affected computer in offline mode. After that you should boot into safe mode and scan your computer to remove all Buma Stemra associated objects.
Security engineers recommend that you back up your files immediately, preferably on an external memory carrier in order to be able to restore them. In order to protect yourself from Buma Stemra (For Windows Users) please follow these simple instructions:
For Windows 7 and earlier:
For Windows 8, 8.1 and 10:
-The configuration menu for File History will appear. Click on ‘Turn On’. After its on, click on Select Drive in order to select the backup drive. It is recommended to choose an external HDD, SSD or a USB stick whose memory capacity is corresponding to the size of the files you want to backup.
-Select the drive then click on ‘Ok’ in order to set up file backup and protect yourself from Buma Stemra.
Enabling Windows File Protection:
– Click on Turn on system protection and select the size on the hard disk you want to utilize for system protection.
Restoring a file via Windows Defense feature:
-Click on Apply and Ok and the file encrypted by Buma Stemra should be restored.