Remove HiddenTear 2.0 Ransomware and Restore .isis Files - How to, Technology and PC Security Forum |

Remove HiddenTear 2.0 Ransomware and Restore .isis Files


A ransomware labeling itself as HiddenTear 2.0 is currently spreading around the Internet. The extension the ransomware puts to encrypted files is .isis and makes a file with instructions. The ransomware is part of “educational” series of ransomware, that gives the decryption key in some way. To remove the ransomware and check how you can restore your data, you should read this article to the end.

Threat Summary

NameHiddenTear 2.0
Short DescriptionThe ransomware uses the AES algorithm and encrypts files placing .isis as an extension to them.
SymptomsThe ransomware does not demand money for decryption but instead creates a file with a randomly-generated password for decryption.
Distribution MethodSpam Emails, Email Attachments, Suspicious Sites
Detection Tool See If Your System Has Been Affected by HiddenTear 2.0


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss HiddenTear 2.0.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

HiddenTear 2.0 Ransomware – Delivery


HiddenTear 2.0 ransomware is delivered through spam email campaigns. Spam emails have a file attached to them. The malicious code is inside that file. One such file goes by the name “skypetool.exe” and has a very rigid logo resembling the one of Skype, as you can see in the picture. Opening such an attachment and your computer will get infected. In other cases, the ransomware creators make the body of the email contain malicious code, where upon opening the said email the infection is spread.

Sites for social media networks and services about file-sharing might have such malware files as well. The malware creators may have put them there. To avoid most chances of getting infected with this ransomware virus you have to watch out for suspicious files and links, redirects and advertising that tries to trick you into clicking stuff. Anything of unknown origin around the Internet is a potential threat – just keep your eyes open.

HiddenTear 2.0 Ransomware – Description

HiddenTear 2.0 is the name that this ransomware gives itself. It encrypts files and creates a ransom note. An interesting fact is that instead of wanting money or BitCoins as payment, it tells users where they can find their randomly-generated decryption key. Security researchers have concluded that is indeed part of the HiddenTear series of ransomware, and it is presumed this is not a real threat, but done with an educational purpose.

You can never really know what the creators have planned. It can be a test for other ransomware viruses, and encrypting your files without explaining anything and just giving a decryption key is not well-planned for a lesson. Not to mention that it’s the same as real ransomware threats as your files will be encrypted and unusable.

Security researcher Jakub Kroustek from AVG has found this ransomware and has given it the name EduCrypt, because of the ransomware’s nature.

The ransomware could create an entry in the Windows Registry to execute automatic running of itself with every Windows start:

→HKCU\Software\Microsoft\Windows\CurrentVersion\Run [exe name]

After encryption, the HiddenTear 2.0 ransomware creates a file named “README.txt” , which contains instructions on how you can restore your files. A decrypter tool is given, but that decrypter still searches for files with the .locked extension and doesn’t work. This is a screenshot of the note:


The ransom note states:

Well hello there, seems you have a virus! Well you are going to get the decryptor which is here Don’t Download Random Shit On The Internet A Hidden .txt File Has Been Created With The Decrypt Password! Find It!..

The text file which is created by the ransomware is called DecryptPassword.txt and contains a 15 symbol decryption key.

The HiddenTear 2.0 ransomware uses the AES algorithm for the encryption of files. File extensions which can get encrypted are the following:

→.jpg, .bmp, .png, .csv, .sql, .mdb, .sln, .php, .asp, .aspx, .html, .txt, .exe, .doc, .docx, .xls, .index, .pdf, .zip, .rar, .css, .lnk, .xlsx, .ppt, .pptx, .odt, .xml, .psd, .bk, .bat, .mp3,. mp4, .wav, .wma, .avi, .divx, .mkv, .mpeg, .wmv, .mov, .ogg

When the encryption process is complete, each file on your computer will have one, and the same extension as an appendix – .isis. That might be a hint that some ransomware viruses on the Internet gather money for terrorist organizations such as ISIS (Islamic State of Iraq and Syria).

HiddenTear 2.0 ransomware probably deletes Shadow Volume Copies from any Windows operating system. At the end of the article, see what you can do to restore your files back to normal.

Remove HiddenTear 2.0 Ransomware and Restore .isis Encrypted Files

If your computer is infected by the HiddenTear 2.0 ransomware, do not worry as there are ways you can get your files back. This ransomware has unknown intentions – it might be a test for other ransomware. After getting your files back, you should remove it and be prepared with having anti-malware software in case of future breaches to your security. You can find all that below in the step-by-step instructions manual that is provided.

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share