Remove Flyper Ransomware and Restore .flyper Encrypted Files - How to, Technology and PC Security Forum |

Remove Flyper Ransomware and Restore .flyper Encrypted Files

flyper-wallpaper-encrypted-file-ransomware-sensorstechforumA ransomware virus, carrying the name Flyper, based on the HiddenTear virus project has been caught out in the wild to infect user PCs. The virus uses a very strong RSA-2048 file encryption mechanism to encipher the files of unsuspecting users, adding it’s distinctive .flyper file extension to the encrypted files. Users are asked in an instructions.txt file to pay in BitCoin a ransom payoff to cyber criminals. Everyone who has been affected by the Flyper virus are warned NOT to pay the ransom money, since there may be alternative methods to decrypt your files. We have provided further instructions on removing Flyper ransomware from your computer and trying to restore your files, so we suggest to read this article carefully.

Threat Summary



Short DescriptionThe malware encrypts users files using a strong encryption algorithm, making direct decryption possible only via a unique decryption key available to the cyber-criminals.
SymptomsThe user may witness ransom notes and “instructions.txt” all linking to a web page and a decryptor. Changed file names and the file-extension .flyper has been used. Also changes the wallpaper to a “You have been hacked!” message.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by Flyper


Malware Removal Tool

User ExperienceJoin our forum to Discuss Flyper Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Flyper Ransomware – How Does It Spread

To infect users, Flyper uses a file that has a very long name, for example:


The file itself is an executable type of file, but it is cleverly masked to resemble an Adobe Reader .pdf file. Such files may be disguised on spam e-mail addresses as well as dropped on your computer via other malware, like Trojan.Downloader, for example. They may also be downloaded via a malicious URL that you may have landed on as a result of a potentially unwatned program that displays ads on your computer.

Flyper Ransomware – More Information

As soon as the malicious file of Flyper has been activated, it may briefly freeze your computer and the opened Windows may enter “Not Responding” state.

Then a command prompt window may open, suggesting the Flyper virus also deletes the shadow volume copies using the following command:

vssadmin delete shadows /all /quiet

After erasting the shadow copies, the Flyper virus immediately gets down to business. It scans for most Widely used type of file extension and if they are present on the computer, the virus encrypts them:


The ransomware then displays a text document, named Instructions.txt. The ransom not in it notifies the users his files are encoded and gives further instructions on how to pay the ransom money in BitCoin:

“Your personal files have been encrypted with strongest encryption RSA 2048 and unique key generated for this computer.
We present a decrypter software which allows to decrypt and return control to all your encrypted files.
We accept a payment with Bitcoin, there are many methods to get them.
On these sites you can buy Bitcoin
To get KEY and Decrypter Program :
1)Send 0.5 BTC bitcoins to this address with Description your PC Computer Name
Bitcoin Address 1PniPmm5kiuuAhXpBWR3QiUtpfAAFm2SS
2)Contact me by email to get your key
[email protected]

Since this is a part of the open source HiddenTear projects, researchers may discover a decryption method and release a free decrypter.

Until then, users are advised to remove Flyper Ransowmare and try to restore their files, using the instructions provided below.

Remove Flyper Ransomware and Restore .Flyper Files

After Flyper attacks your computer and encrypts your files, the first advisable step is to remove it from your PC. You can do this by following the step-by-step instructions below. Malware reverse engineers also advise using a more automatic approach and downloading an advanced anti-malware program to remove this virus from your computer.

If you want to try and restore your files, please check the alternative methods in step “3. Restore files Encrypted by Flyper” below.

Furthermore, we also advise you to follow this article since we will update it as soon as a decrypter for Flyper has been released.

Manually delete Flyper from your computer

Note! Substantial notification about the Flyper threat: Manual removal of Flyper requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Flyper files and objects.
2. Find malicious files created by Flyper on your PC.
3. Fix registry entries created by Flyper on your PC.

Automatically remove Flyper by downloading an advanced anti-malware program

1. Remove Flyper with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by Flyper in the future
3. Restore files encrypted by Flyper
Optional: Using Alternative Anti-Malware Tools

How to Find Decryption Key for Files Encrypted By Flyper Ransomware

We have designed to make a tutorial which is as simple as possible to theoretically explain how could you detect your decryption key. Find out how

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.