Remove Hyena Locker Ransomware – Restore .HYENA Files

Remove Hyena Locker Ransomware – Restore .HYENA Files


This article provides information about a ransomware dubbed Hyena Locker as well as descriptive steps how to remove its malicious files from the system. The threat encrypts important files and demands a ransom payment. By reaching the end of the article, you will know also which alternative data recovery methods may help you to restore a few to all of the .HYENA files.

Hyena Locker ransomware is an infection that plagues essential system settings in order to utilize strong cipher algorithm and corrupt important files stored on the PC. It is associated with the specific extension .HYENA that stands at the end of all encrypted files’ names. At the moment of writing this article, the ransom amount demanded by hackers is unknown. There are only instructions on how to pay provided it in a ransom note file called !_HOW_RECOVERY_FILES_!.txt.

Threat Summary

NameHyena Locker
TypeRansomware, Cryptovirus
Short DescriptionA data locker ransomware that utilizes strond cihper algorithm to encrypt files on stored on the infected computer and then demands a ransom for decryption solution.
SymptomsImportant files are locked and renamed with .HYENA extension. A ransom message appears on PC screen.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Hyena Locker


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Hyena Locker.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Hyena Locker Ransomware – Distribution

An infection with Hyena Locker ransomware is triggered by a malicious executable file. This file may be distributed via several methods preferred by hackers. Email spam campaigns are considered to be the main one. Hackers choose it due to the fact that it allows them to reach large number of online users. How they can obtain your email address is via underground hacker markets available on the dark web. As of the emails they often are sent by the name of well-known companies like PayPal, DHL, FedEx, and Amazon, or sometimes as governmental institutions. The purpose of these emails is to trick you into downloading compromised file attachment or visiting corrupted web page. The moment you open the malicious file on your PC or visit the plagued web page you start Hyena Locker ransomware infection process.

If you want to keep your system secure be advised to check the security status of the files you download from across the net before you open them on your PC. You can do it with the help of a free online file extractor that will scan uploaded files for specific malicious traits. The information you will see after the scan could help you to avoid severe malware infections like Hyena Locker ransomware from infecting your system and data.

Hyena Locker Ransomware – Overview

A research conducted by the security researcher Michael Gillespie indicates that Hyena Locker is another version of Everbe ransomware. He classified this new sample as Everbe 2.0 which probably means that threat actors have modified some parts of the code to make it unique and non-decryptable.

Once activated on the system Hyena Locker ransomware initiates a variety of system settings modifications needed for the smooth encryption process. Some of these changes made by the threat grant the automatic execution of its malicious files on each system start. As a result, all new files created before a system shut down could be encrypted when the operating system is loaded again. As part of the attack is the creation of additional malicious files that support the infection process.

Following encryption stage, details of which are revealed in the next paragraph, Hyena Locker crypto virus displays a ransom note on the PC screen. It is contained in a file named !_HOW_RECOVERY_FILES_!.txt and the message it may depicts reads:

>>>>>>>>>>>>>>>>>>>>>>>>>>>> HYENA LOCKER <<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>> HYENA LOCKER <<<<<<<<<<<<<<<<<<<<<<<<<<<<

It is highly recommendable to avoid negotiations with hackers as they could attempt to steal your banking credentials or infect your system with other malware. Beware that the payment of the ransom doesn’t guarantee the efficient decryption of .HYENA files. Hackers could only steal your money and invest them into new attack campaigns and malware threats.

Hyena Locker Ransomware – Encryption Process

The primary goal of Hyena Locker ransomware is to utilize its built-in encryption module and corrupt target files. Data encryption happens with the help of a sophisticated cipher algorithm. It modifies the original code of predefined types of files to restrict your access to them. In case of infection it is likely that you will find all of the following files encrypted by this ransomware:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Archives
  • Banking credentials, etc.

Encrypted the files have extension .HYENA appended to their original names. There is one more extension associated with the same ransomware that stands before the extension .HYENA and it is the contact email provided by hackers in square brackets .[[email protected]]. So encrypted files are renamed with the following pattern:

The information stored in corrupted files remains inaccessible until a working data restore solution is applied to them. The good news is that the security researcher Michael Gillespie has cracked the code of Everbe ransomware and released a free decryption tool. Since Hyena Locker belongs to Everbe ransomware family encrypted .HYENA files may be decrypted with its help. You can find a download link in the guide below.

Remove Hyena Locker Ransomware and Restore .HYENA Files

There is no doubt that you should remove all files and objects installed by Hyena Locker from the infected PC. Below you could find how to remove it step by step. Beware that ransomware has highly complex code that could plague not only your files but your whole system. Its complete removal demands a bit of technical experience and the ability to recognize malware files traits. That’s why security researchers recommend the help of an advanced anti-malware tool during the removal process. Such a tool will keep your system protected against devastating threats like Hyena Locker and other kinds of malware that endanger your online security on a daily basis.

After you remove the ransomware make sure to check the “Restore Files” step of the guide. But before you take any further actions, don’t forget to back up all encrypted files to an external drive in order to prevent their irreversible loss.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share