Home Malware Programs Ransomware Blackheel Ransomware

Blackheel Ransomware

Posted: January 19, 2021

Open-source file-lockers continue to be used by low-skilled cybercriminals who are interested in crafting their personalized ransomware variant. One of the latest threats to use this strategy is the Blackheel Ransomware. Fortunately, its authors have based their threat on the HiddenTear ransomware project, which uses a flawed encryption routine. This means that while the Blackheel Ransomware causes damage to your files, it should be possible to reverse the damages with the use of free decryption software.

Although the Blackheel Ransomware may be decryptable for free, it is recommended to take the necessary measures to protect yourself from attacks of this sort. If you have fallen victim to this file-locker, then your security is not good enough, and you may soon fall victim to a more threatening malware attack. Blackheel Ransomware's attack can be recognized by the '.a' extension it adds to locked files, as well as by the fact that it drops a ransom note called 'READ_ME.txt.'

The message's contents ask the victim to pay 0.2 Bitcoin for a decryption service. The criminals provide the email blackheel@protonmail.com for contact, and they threaten to leak the user's data online if they do not pay on time. We assure you that this is a bluff since the Blackheel Ransomware does not have the ability to steal files prior to locking them. If this ransomware has damaged your data, we advise you to use the free 'HiddenTear Decryptor' to recover your files and then run a reputable anti-malware application to terminate the threatening program.

Loading...