Hyena is a dangerous variant of ransomware belonging to the MedusaLocker family. It encrypts files on infected computers, appending the “.hyena111” extension to them. This malware not only locks valuable data but also demands a ransom from the victim to restore access. The attackers provide specific instructions for contacting them, and the ransom note urges victims not to attempt recovery using third-party software, as doing so will permanently corrupt the files.
Hyena Ransomware Threat Summary
Aspect | Details |
---|---|
Threat Type | Ransomware, Crypto Virus, Files Locker |
Encrypted Files Extension | .hyena111 |
Ransom Note File Name | READ_NOTE.html |
Associated Email Addresses | pomocit02@kanzensei.top, pomocit02@surakshaguardian.com |
Detection Names | Avast (Win64:RansomX-gen [Ransom]), Combo Cleaner (Gen:Variant.Lazy.633339), ESET-NOD32 (A Variant Of Win64/Filecoder.MedusaLocker.A), Kaspersky (HEUR:Trojan-Ransom.Win32.Generic), Microsoft (Ransom:Win64/MedusaLocker) |
Symptoms of Infection | Files become unreadable and have “.hyena111” extension; ransom note displayed on desktop; inability to open encrypted files |
Damage | Encrypted files; potential installation of additional malware or trojans; data theft or leakage if ransom isn’t paid |
Distribution Methods | Infected email attachments, torrent websites, malicious ads |
Danger Level | High – Data encryption, potential personal data leakage, financial loss |
Download SpyHunter Now & Scan Your Computer For Free!
Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It’s FREE!
How Does Hyena Ransomware Work?
Hyena ransomware works by encrypting files on the victim’s computer using both RSA and AES encryption methods. Once the files are encrypted, they are appended with the “.hyena111” extension. For example, a file named “1.jpg” becomes “1.jpg.hyena111”. The attacker then demands a ransom to decrypt these files.
The ransom note, READ_NOTE.html, is displayed on the victim’s desktop, and the attackers warn against using third-party decryption tools. They claim that such attempts will corrupt the files permanently. The note also threatens to release sensitive data unless the victim pays the ransom, which usually demands payment in Bitcoin.
The ransom note includes email addresses (pomocit02@kanzensei.top and pomocit02@surakshaguardian.com) and a Tor chat link for victims to negotiate the price. The attackers also offer to decrypt 2-3 non-essential files for free as proof of their ability to decrypt the victim’s files.
Symptoms of Hyena Ransomware Infection
Victims of Hyena ransomware will notice several signs of infection:
- File Extension Change: Files that were previously accessible are now unreadable, with the “.hyena111” extension.
- Ransom Note: A READ_NOTE.html file appears on the desktop with instructions on how to contact the attackers.
- Unable to Open Files: Victims can no longer open or use their encrypted files.
- Desktop Wallpaper Change: The ransomware may change the desktop wallpaper to further intimidate the victim.
- Increased Network Activity: If the ransomware spreads to networked devices, they will also become encrypted, resulting in more widespread damage.
How Hyena Ransomware Spreads
Hyena typically spreads through the following methods:
- Email Attachments: Malicious email attachments, often disguised as legitimate files, contain the ransomware. These attachments may contain macros that execute the ransomware when opened.
- Torrent Websites: Downloading pirated software or other malicious files from torrent websites can lead to infection.
- Malicious Ads: Clicking on infected advertisements on compromised websites can trigger the ransomware’s installation.
Additionally, unpatched vulnerabilities in software or compromised USB drives can be exploited to install ransomware.
How to Remove Hyena Ransomware?
If your computer is infected with Hyena ransomware, do not pay the ransom. Cybercriminals may not provide the decryption tool, and paying them could further fund illegal activities. The best approach is to remove the ransomware from your system as soon as possible to prevent further damage and the encryption of additional files.
Download SpyHunter Now & Scan Your Computer For Free!
Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It’s FREE!
Here’s how you can remove Hyena ransomware using SpyHunter:
- Download SpyHunter: Download the tool. It’s crucial to use a trusted malware removal tool like SpyHunter to ensure the complete elimination of ransomware.
- Install and Update SpyHunter: Follow the on-screen instructions to install SpyHunter. Once installed, update the software to the latest version to ensure it can detect the latest malware variants, including Hyena.
- Run a Full Scan: Launch SpyHunter and initiate a Full System Scan to search for the Hyena ransomware and other malware present on your system.
- Remove Detected Malware: Once the scan is complete, review the results and select the option to Remove All detected threats. This will eliminate Hyena ransomware and any other associated malware.
- Restart Your Computer: After SpyHunter has removed the ransomware, restart your system to complete the removal process. Make sure to back up your data and secure any files that weren’t affected.
- Recover Your Files (Optional): If you have backups of your encrypted files, restore them. If you don’t have backups, search for any third-party decryption tools, but always exercise caution when using them.
Preventive Methods to Avoid Hyena Ransomware
To avoid future infections, implement the following preventive measures:
- Regular Backups: Regularly back up important files to an external drive or cloud storage. Ensure that the backup is not connected to your network to avoid ransomware encryption.
- Email Caution: Be cautious when opening email attachments or clicking links in unsolicited emails. Always verify the sender’s address and scan attachments with an antivirus tool before opening them.
- Avoid Pirated Software: Never download software from untrusted or illegal sources, such as torrent sites. These files can often be bundled with malicious payloads.
- Update Software Regularly: Keep all your software, including the operating system, antivirus, and third-party applications, updated to patch any vulnerabilities that could be exploited by ransomware.
- Use Strong, Unique Passwords: Implement strong passwords for all your accounts, and avoid using the same password across multiple sites. Use a password manager to store and generate secure passwords.
- Enable Network Security: Implement firewall protection and secure your network to prevent unauthorized access by malicious actors.
Conclusion
Hyena ransomware is a significant threat that can lead to severe data loss, financial damage, and privacy violations. While it may be difficult to recover encrypted files without paying the ransom, there are ways to remove the infection using SpyHunter and protect yourself from future threats. Always follow preventive best practices to reduce the risk of infection and safeguard your valuable data.
Download SpyHunter Now & Scan Your Computer For Free!
Remove this and any other malicious threats to your system by scanning your computer with SpyHunter now! It’s FREE!