HIDDEN TEAR DECRYPTER CODEBREAKER WILL DEAL WITH AN ARMY OF RANSOMWARES
Developer Michael Gillespie posted about the universal codebreaker HT Brute Force, by means of which, owners of devices infected with viruses of the Hidden Tear family will be able to decode their data for free.
The HiddenTear family viruses became widespread after the source code of the virus was published on Github, which allowed attackers to create an army of clones and turn large-scale cyber attacks.
The publication Bleeping Computer published a manual for victims of Virus-Encoders from the HiddenTear family, following which you can return access to the lost data for free. The HiddenTear family includes the following varieties:
“8lock8, AnonCrack, Assembly, Balbaz, BankAccountSummary, Bansomqare Wanna, Blank, BloodJaws, Boris, CerberTear, CryptConsole2, CryptoKill, CyberResearcher, Data_Locker, Dev-Nightmare 2xx9, Diamond, Domino, Donut, dotRansom, Executioner, Executioner2, Executioner3, Explerer, FlatChestWare, Frog, Fuck_You, Gendarmerie, Horros, JobCrypter, Jodis, J-Ransomware, J-Want-To-Cry, Karmen, Kraken 2.0, Kratos, LanRan, Lime, Lime-HT, Luv, Matroska, MireWare, MoonCrypter, MTC, Nobug, Nulltica, onion3cry, OpsVenezuela, Paul, PayOrDie, Pedo, PGPSnippet, Poolezoor, Pransomware, Predator, Qwerty, Random6, Random6 2, Randion, RansomMine, Rootabx, Saramat, Shrug, ShutUpAndDance, Sorry, Symbiom, TearDr0p, Technicy, The Brotherhood, TheZone, tlar, TotalWipeOut, TQV, Ton, VideoBelle, the infamous whiterose, WhiteRose2, Zalupaid, ZenCrypt, Zenis, ZeroRansom, Zorro”.
Recall that in September, cybersecurity experts Qihoo 360Netlab said that they found a Fbot botnet, built on the basis of Mirai, usually used for DDoS-attacks, which instead of attacking the device, examines the devices for the presence of viruses, miners and destroys them on infected computers.