HSDFSD Ransomware – Remove It and Restore Files
THREAT REMOVAL

HSDFSD Ransomware – Remove It and Restore Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by HSDFSD and other threats.
Threats such as HSDFSD may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

The article will aid you to remove HSDFSD ransomware in full. Follow the ransomware removal instructions provided below in the article.

HSDFSD is a ransomware virus that locks your files using 256-bit AES encryption algorithm. Files get encrypted with a random extension. The HSDFSD virus stores a ransom note in a file called Wo_sind_meine_Dateien.html. You are demanded to pay 0.12 Bitcoin as a ransom payment to supposedly restore your data. Continue to read below to see how you could try to potentially recover some of your data.

Threat Summary

NameHSDFSD
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer and demands a ransom sum to be paid in the Bitcoin cryptocurrency.
SymptomsThe ransomware will encrypt your files, while placing a random extension to them, and also put up a ransom note called Wo_sind_meine_Dateien.html.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by HSDFSD

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss HSDFSD.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

HSDFSD Ransomware – Update November 2017

Update! Recently, a new version of the ransomware has been detected by malware researchers and they have dubbed it “Ordinypt” ransomware. One other thing has been confirmed is that the virus mainly targets German speaking users, by pretending to send a resume as an answer to job advertisments. The following two files are included as attachments inside the email messages that send the payload of the cryptovirus:

  • Viktoria Henschel – Bewerbungsfoto.jpg
  • Viktoria Henschel – Bewerbungsunterlagen.zip

HSDFSD Ransomware – Infection

HSDFSD ransomware might spread its infection with various methods. A payload dropper which initiates the malicious script for this ransomware is being spread around the World Wide Web, and researchers have gotten their hands on a malware sample. If that file lands on your computer system and you somehow execute it – your computer system will become infected. You can see the detections of one such payload file uploaded to the VirusTotal service from the below screenshot:

HSDFSD ransomware might also distribute its payload file on social media and file-sharing services. Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Refrain from opening files right after you have downloaded them. You should first scan them with a security tool, while also checking their size and signatures for anything that seems out of the ordinary. You should read the tips for preventing ransomware found in the forum section.

HSDFSD Ransomware – Overview

HSDFSD is a virus that encrypts your files and extorts you to pay a ransom to supposedly recover them. The malware authors haven’t given it a name, but the ransomware is dubbed by malware researchers after the first letters of the mutex it creates. The extortionists want you to pay in Bitcoin for the alleged restoration of your files.

HSDFSD ransomware might make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows environment. Such entries are typically designed in a way to launch the virus automatically with each start of the Windows Operating System.

That ransom note message is displayed after the encryption of your files is complete. It is inside an .html file named Wo_sind_meine_Dateien.html and can be viewed from the following screenshot down here:

That note reads the following:

Ihre Dateien wurden verschlüsselt!
Sehr geehrte Damen und Herren,
Wie Sie mit Sicherheit bereits festgestellt haben, wurden alle Ihre Dateien verschlüsselt.
Wie erhalte ich Zugriff auf meine Dateien?
Um Ihre Dateien erfolgreich zu entschlüsseln, benötigen Sie unsere Spezielle Software und den dazugehörigen Decrypt-Key.
Wo bekomme ich die Software?
Die Entschlüsselungs-Software können Sie bei uns erwerben.
Der Preis für die Entschlüsselungs-Software beläuft sich auf 0.12 Bitcoin (ca. 600 Euro).
Bitte beachten Sie, dass wir ausschließlich Bitcoin für den Erwerb der Software akzeptieren.
Wo bekomme ich Bitcoin?
Bitcoin können Sie Online sowie Offline erwerben, eine Liste empfohlener Anbieter folgt:
https://www.bitcoin.de/de/ – Online
https://localbitcoins.com/ – Online / Offline
https://btcdirect.eu/de-at – Online
https://www.virwox.com – Online
Zahlungsanweisungen
Bitte transferieren Sie exakt 0.12 Bitcoin an folgende Addresse: 19AbncMWfdfifbQfJ8xVNR4s6H8n5eyfCF
Nach erfolgreichem Zahlungseingang erhalten Sie automatisch die Entschlüsselungs-Software sowie den dazugehörigen Decrypt-Key.
ACHTUNG!
Sollten wir innerhalb von 7 Tagen keinen Zahlungseingang feststellen, gehen wir davon aus, dass Sie kein Interesse an der Entschlüsselung Ihrer Dateien haben. In diesem Fall löschen wir den Decrypt-Key unwiderruflich und Ihre Dateien sind für immer verloren.
Ihre Dateien wurden mit einem 256-Bit AES Algorithmus auf Militärqualität verschlüsselt. Wir empfehlen Ihnen keine Zeit mit eigenhändigen Entschlüsselungsversuchen zu verschwenden, dies würde Sie nur unnötig Zeit und weiteres Geld kosten, Ihre Dateien wären aber weiterhin verschlüsselt.
Bonus
Zusätzlich zur Entschlüsselungs-Software erhalten Sie nach erfolgreicher Zahlung, hinweise wie die Schadsoftware auf Ihre System gelangen konnte und wie Sie sich in Zukunft vor weiteren Übergriffen schützen können!

A rough translation in English would be the following:

Your files have been encrypted!
Dear Sir or Madam,
As you’ve already noticed, all your files have been encrypted.
How do I get access to my files?
To successfully decrypt your files, you need our special software and its decrypt key.
Where can I get the software?
The decryption software can be purchased from us.
The price for the decryption software is 0.12 Bitcoin (about 600 Euro).
Please note that we only accept Bitcoin for the purchase of the software.
Where can I get Bitcoin?
Bitcoin can be purchased online as well as offline. A list of recommended providers follows:
https://www.bitcoin.de/de/ – Online
https://localbitcoins.com/ – Online / Offline
https://btcdirect.eu/de-at – Online
https://www.virwox.com – Online
money orders
Please transfer exactly 0.12 Bitcoin to the following address: 19AbncMWfdfifbQfJ8xVNR4s6H8n5eyfCF
After successful payment, you will automatically receive the decryption software and the associated decrypt key.
ATTENTION!
If we do not notice any payment within 7 days, we assume that you are not interested in decrypting your files. In this case, we will irrevocably delete the decrypt key and your files will be lost forever.
Your files were encrypted with military quality using a 256-bit AES algorithm. We do not recommend wasting time decrypting yourself, it would only cost you extra time and money, but your files would still be encrypted.
bonus
In addition to the decryption software, after successful payment, you will receive instructions on how the malware could reach your system and how you can protect yourself from further attacks in the future!

The note of the HSDFSD ransomware states that your files are encrypted. You are demanded to pay 0.12 Bitcoin which equates to around 850 US dollars. However, you should NOT under any circumstances pay any ransom. Your files may not get recovered, and nobody could give you a guarantee for that. Moreover, giving money to cybercriminals will most likely motivate them to create more ransomware viruses or commit different criminal acts.

HSDFSD Ransomware – Encryption

What is known for the encryption process of the HSDFSD ransomware is that the cryptovirus places a random extension to all locked files. Furthermore, the encryption algorithm used by the virus is AES with 256 bit ciphers, according to the ransom note at least.

The targeted extensions of files which are sought to get encrypted are currently unknown and if a list is discovered, it will be posted here as the article gets updated. The files used most by users and which are probably encrypted are from the following categories:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

The HSDFSD cryptovirus is coded to erase all the Shadow Volume Copies from the Windows Operating System by using the following command:

→cmd /c vssadmin.exe delete shadows /all /quiet & wmic shadowcopy delet

The above-stated command is executed and that makes the encryption process more efficient. That is due to the fact that the command eliminates one of the prominent ways to restore your data. If your computer device was infected with this ransomware and your files are locked, keep on reading to find out how you could potentially recover your files.

Remove HSDFSD Ransomware and Restore Files

If your computer got infected with the HSDFSD ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by HSDFSD and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as HSDFSD.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove HSDFSD follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove HSDFSD files and objects
2. Find files created by HSDFSD on your PC

IMPORTANT!
Before starting the Automatic Removal below, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by HSDFSD

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...