A ransomware labeling itself as HiddenTear 2.0 is currently spreading around the Internet. The extension the ransomware puts to encrypted files is .isis and makes a file with instructions. The ransomware is part of “educational” series of ransomware, that gives the decryption key in some way. To remove the ransomware and check how you can restore your data, you should read this article to the end.
|Short Description||The ransomware uses the AES algorithm and encrypts files placing .isis as an extension to them.|
|Symptoms||The ransomware does not demand money for decryption but instead creates a file with a randomly-generated password for decryption.|
|Distribution Method||Spam Emails, Email Attachments, Suspicious Sites|
See If Your System Has Been Affected by HiddenTear 2.0
Malware Removal Tool
|User Experience||Join Our Forum to Discuss HiddenTear 2.0.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
HiddenTear 2.0 Ransomware – Delivery
HiddenTear 2.0 ransomware is delivered through spam email campaigns. Spam emails have a file attached to them. The malicious code is inside that file. One such file goes by the name “skypetool.exe” and has a very rigid logo resembling the one of Skype, as you can see in the picture. Opening such an attachment and your computer will get infected. In other cases, the ransomware creators make the body of the email contain malicious code, where upon opening the said email the infection is spread.
Sites for social media networks and services about file-sharing might have such malware files as well. The malware creators may have put them there. To avoid most chances of getting infected with this ransomware virus you have to watch out for suspicious files and links, redirects and advertising that tries to trick you into clicking stuff. Anything of unknown origin around the Internet is a potential threat – just keep your eyes open.
HiddenTear 2.0 Ransomware – Description
HiddenTear 2.0 is the name that this ransomware gives itself. It encrypts files and creates a ransom note. An interesting fact is that instead of wanting money or BitCoins as payment, it tells users where they can find their randomly-generated decryption key. Security researchers have concluded that is indeed part of the HiddenTear series of ransomware, and it is presumed this is not a real threat, but done with an educational purpose.
You can never really know what the creators have planned. It can be a test for other ransomware viruses, and encrypting your files without explaining anything and just giving a decryption key is not well-planned for a lesson. Not to mention that it’s the same as real ransomware threats as your files will be encrypted and unusable.
Security researcher Jakub Kroustek from AVG has found this ransomware and has given it the name EduCrypt, because of the ransomware’s nature.
The ransomware could create an entry in the Windows Registry to execute automatic running of itself with every Windows start:
→HKCU\Software\Microsoft\Windows\CurrentVersion\Run [exe name]
After encryption, the HiddenTear 2.0 ransomware creates a file named “README.txt” , which contains instructions on how you can restore your files. A decrypter tool is given, but that decrypter still searches for files with the .locked extension and doesn’t work. This is a screenshot of the note:
The ransom note states:
Well hello there, seems you have a virus! Well you are going to get the decryptor which is here http://www.filedropper.com/decrypter_1 Don’t Download Random Shit On The Internet A Hidden .txt File Has Been Created With The Decrypt Password! Find It!..
The text file which is created by the ransomware is called DecryptPassword.txt and contains a 15 symbol decryption key.
The HiddenTear 2.0 ransomware uses the AES algorithm for the encryption of files. File extensions which can get encrypted are the following:
→.jpg, .bmp, .png, .csv, .sql, .mdb, .sln, .php, .asp, .aspx, .html, .txt, .exe, .doc, .docx, .xls, .index, .pdf, .zip, .rar, .css, .lnk, .xlsx, .ppt, .pptx, .odt, .xml, .psd, .bk, .bat, .mp3,. mp4, .wav, .wma, .avi, .divx, .mkv, .mpeg, .wmv, .mov, .ogg
When the encryption process is complete, each file on your computer will have one, and the same extension as an appendix – .isis. That might be a hint that some ransomware viruses on the Internet gather money for terrorist organizations such as ISIS (Islamic State of Iraq and Syria).
HiddenTear 2.0 ransomware probably deletes Shadow Volume Copies from any Windows operating system. At the end of the article, see what you can do to restore your files back to normal.
Remove HiddenTear 2.0 Ransomware and Restore .isis Encrypted Files
If your computer is infected by the HiddenTear 2.0 ransomware, do not worry as there are ways you can get your files back. This ransomware has unknown intentions – it might be a test for other ransomware. After getting your files back, you should remove it and be prepared with having anti-malware software in case of future breaches to your security. You can find all that below in the step-by-step instructions manual that is provided.
Manually delete HiddenTear 2.0 from your computer
Note! Substantial notification about the HiddenTear 2.0 threat: Manual removal of HiddenTear 2.0 requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.