Remove HiddenTear 2.0 Ransomware and Restore .isis Files - How to, Technology and PC Security Forum | SensorsTechForum.com
THREAT REMOVAL

Remove HiddenTear 2.0 Ransomware and Restore .isis Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by HiddenTear 2.0 and other threats.
Threats such as HiddenTear 2.0 may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

decrypt-ransomware-stforum

A ransomware labeling itself as HiddenTear 2.0 is currently spreading around the Internet. The extension the ransomware puts to encrypted files is .isis and makes a file with instructions. The ransomware is part of “educational” series of ransomware, that gives the decryption key in some way. To remove the ransomware and check how you can restore your data, you should read this article to the end.

Threat Summary

NameHiddenTear 2.0
TypeRansomware
Short DescriptionThe ransomware uses the AES algorithm and encrypts files placing .isis as an extension to them.
SymptomsThe ransomware does not demand money for decryption but instead creates a file with a randomly-generated password for decryption.
Distribution MethodSpam Emails, Email Attachments, Suspicious Sites
Detection Tool See If Your System Has Been Affected by HiddenTear 2.0

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss HiddenTear 2.0.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

HiddenTear 2.0 Ransomware – Delivery

STF-hiddentear-ransomware-hidden-tear-educrypt-crypto-virus-isis

HiddenTear 2.0 ransomware is delivered through spam email campaigns. Spam emails have a file attached to them. The malicious code is inside that file. One such file goes by the name “skypetool.exe” and has a very rigid logo resembling the one of Skype, as you can see in the picture. Opening such an attachment and your computer will get infected. In other cases, the ransomware creators make the body of the email contain malicious code, where upon opening the said email the infection is spread.

Sites for social media networks and services about file-sharing might have such malware files as well. The malware creators may have put them there. To avoid most chances of getting infected with this ransomware virus you have to watch out for suspicious files and links, redirects and advertising that tries to trick you into clicking stuff. Anything of unknown origin around the Internet is a potential threat – just keep your eyes open.

HiddenTear 2.0 Ransomware – Description

HiddenTear 2.0 is the name that this ransomware gives itself. It encrypts files and creates a ransom note. An interesting fact is that instead of wanting money or BitCoins as payment, it tells users where they can find their randomly-generated decryption key. Security researchers have concluded that is indeed part of the HiddenTear series of ransomware, and it is presumed this is not a real threat, but done with an educational purpose.

You can never really know what the creators have planned. It can be a test for other ransomware viruses, and encrypting your files without explaining anything and just giving a decryption key is not well-planned for a lesson. Not to mention that it’s the same as real ransomware threats as your files will be encrypted and unusable.

Security researcher Jakub Kroustek from AVG has found this ransomware and has given it the name EduCrypt, because of the ransomware’s nature.

The ransomware could create an entry in the Windows Registry to execute automatic running of itself with every Windows start:

→HKCU\Software\Microsoft\Windows\CurrentVersion\Run [exe name]

After encryption, the HiddenTear 2.0 ransomware creates a file named “README.txt” , which contains instructions on how you can restore your files. A decrypter tool is given, but that decrypter still searches for files with the .locked extension and doesn’t work. This is a screenshot of the note:

STF-hiddentear-ransomware-hidden-tear-educrypt-crypto-virus-isis-readme-txt-file

The ransom note states:

Well hello there, seems you have a virus! Well you are going to get the decryptor which is here http://www.filedropper.com/decrypter_1 Don’t Download Random Shit On The Internet A Hidden .txt File Has Been Created With The Decrypt Password! Find It!..

The text file which is created by the ransomware is called DecryptPassword.txt and contains a 15 symbol decryption key.

The HiddenTear 2.0 ransomware uses the AES algorithm for the encryption of files. File extensions which can get encrypted are the following:

→.jpg, .bmp, .png, .csv, .sql, .mdb, .sln, .php, .asp, .aspx, .html, .txt, .exe, .doc, .docx, .xls, .index, .pdf, .zip, .rar, .css, .lnk, .xlsx, .ppt, .pptx, .odt, .xml, .psd, .bk, .bat, .mp3,. mp4, .wav, .wma, .avi, .divx, .mkv, .mpeg, .wmv, .mov, .ogg

When the encryption process is complete, each file on your computer will have one, and the same extension as an appendix – .isis. That might be a hint that some ransomware viruses on the Internet gather money for terrorist organizations such as ISIS (Islamic State of Iraq and Syria).

HiddenTear 2.0 ransomware probably deletes Shadow Volume Copies from any Windows operating system. At the end of the article, see what you can do to restore your files back to normal.

Remove HiddenTear 2.0 Ransomware and Restore .isis Encrypted Files

If your computer is infected by the HiddenTear 2.0 ransomware, do not worry as there are ways you can get your files back. This ransomware has unknown intentions – it might be a test for other ransomware. After getting your files back, you should remove it and be prepared with having anti-malware software in case of future breaches to your security. You can find all that below in the step-by-step instructions manual that is provided.

Note! Your computer system may be affected by HiddenTear 2.0 and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as HiddenTear 2.0.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove HiddenTear 2.0 follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove HiddenTear 2.0 files and objects
2. Find files created by HiddenTear 2.0 on your PC

IMPORTANT!
Before starting the Automatic Removal below, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by HiddenTear 2.0

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...