The Brotherhood Ransomware
Ransomware | 07/09/2018

Guide to remove The Brotherhood Ransomware

About: The Brotherhood Ransomware is a nasty system infection that aims to encrypt important system files using sophisticated system algorithm and extort users by demanding a ransom of 100 BTC from the victims in exchange for the decryption key. Let ...  Read More  

| Ransomware | Guide to remove The Brotherhood Ransomware

How to Remove The Brotherhood Ransomware?


The Brotherhood Ransomware is a nasty system infection designed to plague computer systems with the sole motive to encrypt important system files. The ransomware is based on the code of Hidden Tear Ransom family and uses sophisticated AES encryption algorithm to transform the original code of files to restrict the access to the users.

Hidden Tear based infection codes are open source codes and ransomware families designed using these codes stealthily sneak in the system to harvest sensitive information that comprise of user personal information as well as information related to installed hardware components. Hardware related information is gathered to optimize the ongoing or any future attacks on the system.


Threat Behavior:

To accomplish the main purpose of data encryption, the ransomware establishes the malicious code in the system either via email phishing messages or infected payload documents. In order to attain persistence, the ransomware then afflicts essential system settings. It then encrypts all of the files stored in the system with the following extensions:

.sql, .csv, .doc, .xls, .pdf, .ppt, .gif, .jpg, .png, .docx, .txt etc The files are encrypted and renamed with the specific .ransomcrypt extension. Victim is informed about the attack via an automatic display of an image with a filename RansomNote.jpg on the desktop wallpaper. The image depicts a ransom note that reads as:

The brotherhood Ransom Note

In exchange for the decryption key hackers demand an insane amount of 100 BTC from the victims. Instructions on how to pay the ransom is provided in the ransom note. However users should never agree to pay the ransom as they are often ignored once the ransom is paid.

In order to evade detection Brotherhood Ransomware is configured to bypass anti-virus programs installed in the system. Once infiltrated the ransomware invades system registries and makes the system susceptible to other system infections.


The Brotherhood Ransomware – Distribution:

Hackers use shady spread techniques to trick users to install the malicious payload to their system.

  • The payload is an executable file with the malicious script embedded that is distributed either via deceptive email attachments.

The emails are portrayed as legitimate from popular institutions or business service like Amazon, FedEx etc. that present a sense of urgency in the mails to trick users into opening the malicious code and exploit them.

The compromised email attachments include spam documents, bills, taxes, pictures, notifications, invoices, or in-text links that triggers an infection with the devastating The Brotherhood ransomware.

  • Software Bundling: Software bundling is the process in which a malicious program is distributed with other free software, to get an unnoticed entry into your computer system. When a user installs a free application, the malicious programs gains a front door entry with the free application, the user has downloaded. Thus, it is a good idea to keep an eye on the installation screens while installing these free applications.
  • Malicious Websites or Malevolent Advertisements: The malicious websites are the ones which are created just for promoting the malware infections. Such websites include but are not limited to porn sites, torrent sites and other free downloading platforms. By visiting such websites, the adware infects the user’s computer without permission. Fake advertisements and updates like Flash player and windows updates which ask the user to update to the latest version are a few examples. When the users click on such links, their computer system gets infected. That is why, it is highly recommended to resist clicking on such links. Also avoid clicking on advertisements offering free stuff such as Win and i Phones, cars or free overseas trips etc.

 Symptoms of the Brotherhood Ransomware:

  • The files are encrypted and renamed with .ransomcrypt extension and hence cannot be accessed by users.
  • User’s desktop screen might be locked, so they can’t access your PC.
  • Important system files may be deleted by the ransomware.
  • Sluggish PC performance.
  • Anti-virus software might stop working.


Threat Summary

  • Name: The Brotherhood
  • Browsers Affected: Google Chrome, Internet Explorer, Mozilla Firefox, Safari, Opera
  • Targeted Operating System: Windows and MAC
  • Category: Ransomware
  • Symptoms: User’s files are encrypted. All locked files are appended with malicious ‘.ransomcrypt’extension after the encryption and hence cannot be accessed by the user. Unusual performance issues.

How to solve the problem?



Tips to prevent your computer system from getting infected –

  1. Keeping the Operating System Updated- In order to remain protected and avoid such infections, it is recommended to keep your Operating System updated by enabling the automatic update on your system. The systems with outdated or older versions of Operating System become an easy target for the attackers.
  2. Resist clicking on spam emails – One of the major techniques used for malware distribution is forwarding spam emails to the user. The system gets infected as soon as the user clicks on the attachment. These mails appear to be genuine, so be aware and resist falling for these tricks.
  3. Keep an eye on third party installations- It is quite important that you take due care while installing any third party applications for they are major source of such infections. Such malware programs come bundled with the free applications thereby requiring the user to remain cautious.
  4. Regular periodical backup- In order to keep your data and files safe, it is recommended to take regular back up of all your data and files either on an external drive or cloud.
  5. Use Anti-Virus Protection- We strongly recommend the use of antivirus protection/internet security in your PC like BULL GUARD and Sophos so that it remains safe.
  6. Enable the Ad Blocker/Popup Blocker in your browser- Enabling the popup blocker/ ad blocker in your chosen browser will help you to stay protected from annoying adware.

Hits: 42

Leave a Reply

Your email address will not be published. Required fields are marked *

Did you find the article informative? Yes NO

Get Regular Updates Related to All the Threats

Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.

Virus Removal Guidelines
Plot No 319, Nandpuri- B Pratap Nagar
Rajasthan 302033
Phone: +91 9799661866