Remove ShutUpAndDance Virus and Restore .ShutUpAndDance Files

ShutUpAndDance Virus image ransomware note .ShutUpAndDance extension

The ShutUpAndDance Virus is a basic ransomware strain of the Hidden Tear family. The security analysis shows that this is the initial release of the threat, future updates are expected in coordinated attacks. Refer to our in-depth article for a technical analysis and full removal instructions.

Threat Summary

NameShutUpAndDance Virus
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .ShutUpAndDance extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by ShutUpAndDance Virus

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss ShutUpAndDance Virus.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

ShutUpAndDance Virus – Distribution Ways

As soon as the ShutUpAndDance virus infection begins the main module will start to run its prescribed behavior pattern. The security investigation reveals that it is based on the Hidden Tear ransowmare family. As such its behavior can be fine tuned according to each target campaign.

The ShutUpAndDance virus has been captured in a limited attack campaign targeting mainly English-speaking computer users. We anticipate that in future attacks the hackers behind it will utilize a whole array of infection tactics.

A common way to spread this threat is to send out phishing email messages. They are designed to intentionally confuse the users into thinking that they have received a message from a well-known company or a service that they use. They can either attach (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Martin Beltov. Read the original post at: