Remove CyberSCCP Virus (Hidden Tear Ransomware) – Restore .CyberSCCP Files

CyberSCCP Virus image ransomware note  .CyberSCCP extension

The CyberSCCP virus is a new strain of the Hidden Tear ransomware family. Each individual attack can be configured so that it targets the targets specifically. Refer to our in-depth article for a technical analysis and full removal instructions.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .CyberSCCP extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by CyberSCCP

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss CyberSCCP.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

CyberSCCP Virus – Distribution Ways

The CyberSCCP virus is being distributed using various tactics. The captured strains are relatively low which does not give an accurate measurement of the primary methods. As such we anticipate that the hackers will use the most common methods.

One of them relies on the coordination of SPAM email campaigns. They carry the files directly attached or hyperlinked in the body contents. They are also one of the primary carriers of infected payloads. Two of the most popular types include the following:

  • Infected Software Installers — The criminal controllers can embed the virus code into application installers. They often choose popular software ranging from system utilities and creativity suites to productivity apps.
  • Documents — The hackers can utilize the same mechanism in infecting files such as spreadsheets, text documents, presentations and etc. Once they (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: