HiddenTear is an open source ransomware developed by a Turkish programmer and later released as proof of concept on GitHub. The malware generates a local symmetric key in order to encrypt a configurable folder (/test was the default one) and it sends it to a centralized C&C server. Due to its small payload it was used as real attack vector over email phishing campaigns. Variants are still used in attacks.
|2021-11-04 ⋅ CrowdStrike ⋅ |
CARBON SPIDER Embraces Big Game Hunting, Part 2
BlackMatter Griffon BlackMatter DarkSide HiddenTear JSSLoader
|2020-05-26 ⋅ Bleeping Computer ⋅ |
New [F]Unicorn ransomware hits Italy via fake COVID-19 infection map
|2020-05-25 ⋅ Twitter (@JAMESWT_MHT) ⋅ |
Tweet on FuckUnicorn instance of HiddenTear
|2019-10-26 ⋅ Dissecting Malware ⋅ |
Earn-quick-BTC-with-Hiddentear.mp4 / About Open Source Ransomware
|2018-01-09 ⋅ Twitter (@struppigel) ⋅ |
Tweet on HiddenTear Sample
|2017-06-12 ⋅ SlideShare ⋅ |
Open Source Malware - Sharing is caring?
|2016-03-20 ⋅ Tripwire ⋅ |
Hidden Tear Project: Forbidden Fruit Is the Sweetest
|2015-08-18 ⋅ Github (goliate) ⋅ |
There is no Yara-Signature yet.