Black Hunt 2.0 Ransomware Threatens to Leak Stolen Data


During our examination of recent submissions, our dedicated research team stumbled upon a menacing ransomware dubbed Black Hunt 2.0. This malicious software operates by encrypting valuable data and then demanding ransoms for the decryption keys.

During our testing on a controlled machine, Black Hunt 2.0 demonstrated its encryption prowess by modifying filenames with a unique victim ID, the email address of the cyber criminals, and a ".Hunt2" extension. For example, a file initially named "1.jpg" transformed into "1.jpg.[H5uuEUou7Ulql9eQ].[].Hunt2," and so forth.

Subsequently, Black Hunt 2.0 presented various ransom notes. One appeared before the login screen, another as a pop-up window named "#BlackHunt_ReadMe.hta," and a text file labeled "#BlackHunt_ReadMe.txt." Furthermore, this ransomware made changes to the desktop wallpaper for added impact.

The message displayed before the login screen explicitly informs the victim of their compromised network status. It asserts that all essential files have been encrypted and stolen, directing them to read the other ransom notes and initiate communication with the attackers.

The text file elaborates on the situation, revealing that besides the decryption, the cyber criminals have also managed to exfiltrate a broad range of vulnerable data from the infected network. This note emphasizes the necessity of contacting the attackers promptly to prevent the leaked dissemination of the stolen content.

As for the pop-up window, it delivers a clear ultimatum, warning that sensitive data will be publicly disclosed or sold if communication is not initiated within 14 days. Moreover, the message cautions against any attempts to rename the encrypted files, utilize third-party decryption tools, or seek assistance from intermediary services.

Black Hunt 2.0 Ransom Note Threatens Data Leak

The full text of the ransom note displayed in the Black Hunt 2.0 pop-up window reads as follows:


We also have uploaded your sensitive data, which we Will leak or sell in case of no cooperation!

Restore your data possible only buying private key from us


remember, there are many middle man services out there pretending that they can recover or decrypt your files , whom neither will contact us or scam you, Remember we are first and last solution for your files otherwise you will only waste money and time

trying to decrypt your files without our decryptor and through third party softwares will make your files completely useless, there is no third party decryptor since we are the only key holders

we have uploaded many critical data and information from your machines , we won't leak or sell any of them in Case of successful Corporation, however if we don't hear from you in 14 days we will either sell or leak your data in many forums

Remain all of your files untouched, do not change their name, extension and…


Your system is offline. in order to contact us you can email this address this ID ( H5uuEUou7Ulql9eQ ) for the title of your email.

If you weren't able to contact us whitin 24 hours please email: , TELEGRAM : @tokyosupp

Check your data situation in -

How Can You Protect Your Data from Ransomware?

Protecting your data from ransomware requires a multi-layered approach to safeguard your systems and mitigate the risks of an attack. Here are some essential steps to help protect your data from ransomware:

Regular Backups: Ensure you regularly back up all your important data to an external device or a secure, off-site cloud storage. Having backups allows you to restore your data if it gets encrypted during a ransomware attack.

Keep Software Updated: Regularly update your operating system, software applications, and antivirus programs. Software updates often include security patches that address known vulnerabilities exploited by ransomware.

Use Strong Passwords: Create strong, unique passwords for all your accounts and devices. Avoid using the same password across multiple accounts, and consider using a password manager to keep track of them securely.

Educate Users: Train yourself and your team about ransomware threats and safe online practices. Teach them to be cautious with email attachments, links, and suspicious websites.

Email Safety: Be vigilant about phishing emails. Avoid clicking on links or downloading attachments from unknown or suspicious sources. Verify the sender's email address and be cautious of unexpected or urgent requests.

July 24, 2023

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.