Hets Ransomware

Hets Ransomware Description

Among the newest ransomware threats lurking the Web is the Hets Ransomware. Upon uncovering the Hets Ransomware, researchers studied this Trojan and found that it belongs to the infamous STOP Ransomware family. Instead of building their own file-locking Trojans, most cyber crooks who distribute threats of this type opt to use the source code of an already existing threat and alter it to their liking. This not only cut back time but also enables cybercriminals with less experience to propagate ransomware threats.

Propagation and Encryption

The dissemination methods involved in the spreading of the Hets Ransomware have not yet been disclosed. Browsing dodgy websites and downloading pirated content can increase your chances of getting your system infected by a ransomware threat greatly. Authors of data-encrypting Trojans often use spam emails with macro-laced attachments, bogus software updates, torrents trackers, and fraudulent pirated versions of popular applications to distribute their threatening creations. Ransomware threats usually target a wide variety of file types. Rest assured that all images, documents, videos, databases, archives, audio files, presentations, etc. will be encrypted by this nasty threat most certainly. The Hets Ransomware applies a complex encryption algorithm to lock the targeted data. When t he Hets Ransomware encrypts a file, it will append a new extension to the end of the file name. The extension that the Hets Ransomware uses is '.hets.' A file that was named 'pacific-ocean.jpeg' originally will be renamed to 'pacific-ocean.jpeg.hets' as soon as the encryption process of the Hets Ransomware has been completed.

The Ransom Note

In the next step of the attack, the Hets Ransomware will drop its ransom note on the desktop of the user. The ransom message of the Hets Ransomware is contained in a file called '_readme.txt,' which is a symbol of data-locking Trojans that belong to the STOP Ransomware family. The attackers explain that the ransom fee is $490, but users who fail to get in touch with them within three days of the attack will have to pay double the price - $980. As a proof that the attackers have a functioning decryption key that is capable of reversing the damage done to the user's files, they offer to unlock 1-2 files for free, provided that they do not contain any important information. The attackers give out two email addresses where they can be contacted - ‘datahelp@iran.ir' and ‘datarestorehelp@firemail.cc.'

You can take advantage of the attackers' offer and get 1-2 of your files decrypted for free. However, we advise you against paying the ransom fee because cybercriminals do not tend to keep their promises. This is how countless victims of ransomware have been left disappointed and empty-handed despite paying the ransom fee demanded. Instead, download and install a genuine anti-spyware solution that will help you wipe off the Hets Ransomware from your PC once and for all.

Do You Suspect Your PC May Be Infected with Hets Ransomware & Other Threats? Scan Your PC with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Hets Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. Free Remover allows you to run a one-off scan and receive, subject to a 48-hour waiting period, one remediation and removal. Free Remover subject to promotional details and Special Promotion Terms. To understand our policies, please also review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.

Related Posts

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.