Remove FoxRansom Virus (Hidden Tear) and Restore .fox Files

FoxRansom Virus image ransomware note .fox extension

The FoxRansom Virus is a ransomware strain of the Hidden Tear family targeting primarily Hungarian-speaking computer users. The captured samples carry the initial infection commands, we presume that further updates to it may include newer components and additional instructions. Refer to our in-depth article for a technical analysis and full removal instructions.

Threat Summary

NameFoxRansom Virus
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .fox extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by FoxRansom Virus

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss FoxRansom Virus.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

FoxRansom Virus – Distribution Ways

The FoxRansom virus is a newly discovered ransomware threat, the first infections were reported last week in a targeted attack. It appears that the first wave of infections are directed against Hungarian-speaking users.

Due to the low number of captured samples the analysis does not reveal which is the main infection technique. One of the primary ways is to send out SPAM email messages that usually containing phishing elements. They are images and text taken from popular Internet services that are placed in the message contents. They coerce the users into interacting with malicious elements which can essentially leads to the infection. The dangerous files can be either linked or attached directly.

The hackers can also make use (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Martin Beltov. Read the original post at: