BlackRuby2 virus - How to remove

BlackRuby2 ransomware virus is named this way because it adds .blackruby2 extension to encrypted files. As always, ransomware viruses are looking to infect computers, lock certain files and then ask for the ransom to be paid in order to decrypt them. BlackRuby2 fits this description just perfectly – it will do all those things and more.

BlackRuby2 virus remove

If you have discovered that your computer is infected with this particular viruses or you are suspicious that it is trying to enter your system, please proceed reading the article. We will teach you how to remove this ransomware from your computer and restore locked files. Also, it is important to make sure that your computer is protected against threats like this one.

BlackRuby2 ransomware spread as an attachment to email letters

Ransomware like Ultimo virus or Zenis virus are distributed as attachments to spam emails and BlackRuby2 is distributed the exact same way. Cyber criminals simply launch a spam mail campaign and send millions of letters to random email addresses. Besides the fact that most of them land in Spam folders, some users still open them.

It doesn’t take much to get infected – open attached file to such email and all malicious files of the virus will be automatically uploaded to your computer. After that, there is no way back, unless you have anti-malware software with real time protection on your computer. It is the most efficient way to ensure security of your computer, therefore we recommend to take a look at our reviews section and get yourself one of those programs.

Adding .blackruby2 extension

As we have already mentioned, will scan your computer for files that can be encrypted. It is capable of encrypting all most popular file types – images, text documents, audio and video files and so on. That being said, most or all of your private documents will be encrypted.

Encryption is a process that employs certain cryptography and apply it to the file. After that, you won’t be able to open or use that file anymore. Cyber criminals behind ransomware are capable of reversing the process and decrypting the file, but they will ask you to pay the ransom for this privilege.

It’s obvious, that BlackRuby2 is just a newer, updated version of BlackRuby virus that was discovered last month. It is based on InfiniteTear virus, therefore decryption of files affected by this virus is extremely complicated.

After successfully infecting computer and encrypting files stored on it, BlackRuby2 virus will automatically create file called “HOW-TO-DECRYPT-FILES.txt”. It contains instructions how to pay the ransom. Original text of the message:

===================== Identification Key =====================

===================== Identification Key =====================

[Can not access your files?]

Congratulations, you are now part of our family #BlackRuby Ransomware. The range of this family is wider and bigger every day.
Our hosts welcome our presence because we will give them a scant souvenir from the heart of Earth.

This time, we are guest with a new souvenir called “Black Ruby”. A ruby ​​in black, different, beautiful, and brilliant, which has been
bothered to extract those years and you must also endure this hard work to keep it. If you do not have the patience of
this difficulty or you hate some of this precious stone, we are willing to receive the price years of mining
and finding rubies for your relief and other people of the world who are guests of the black ruby.

So let’s talk a little bit with you without a metaphor and literary terms to understand the importance of the subject.
It does not matter if you’re a small business or you manage a large organization, no matter whether you are a regular
user or a committed employee, it’s important that you have a black ruby and to get rid of it, you need to get back to
previous situation and we need a next step.

The breadth of this family is not supposed to stop, because we have enough knowledge and you also trust our knowledge.
We are always your backers and guardian of your information at this multi-day banquet and be sure that no one in the
world can take it from you except for us who extracts this precious stone.

We need a two-sided cooperation in developing cybersecurity knowledge. The background to this cooperation is a mutual trust,
which will result in peace and tranquility. you must pay us worth of Bitcoins for restore your system to the previous state and
you are free to choose to stay in this situation or return to the normal.

In the end, we have to mention a few things about the second version.
Black Ruby Despite the early and false judgments of the news media about the false reports of fraudulent and slander about not sending decryptor to victims,
the popularity of popular sites to attract visitors with the title “Black Ruby Removal”, as well as blocking the allegedly secure service of
Proton Mail that it was only our only email and the uncertainty of dear customers,
is still standing and more powerful than before with the second version came to the field.

In this version, with a new approach and a small change, we are a guest of new hosts and also support the first version.
our hosts are patient, slightly angry and 100% trustworthy.
They know that the key is in our hands and titles like “Removing Black Ruby on the System”, which are covered on most sites, is a big lie to
advertising purposes.
We have been working out deep earth for the extraction of black ruby and we have partnered with you to sympathize with us in this difficulty.
We know that you are the only good protector of the black ruby and our only honored miner.

Do not forget that your opportunity is limited. From these limits you can create golden situations. Be sure we will help
you in this way and to know that having a black ruby does not always mean riches. You and your system are poor,
poor knowledge of cybersecurity and lack of security on your system!



1. Copy “Identification Key”.
2. Send this key with two encrypted files (less than 5 MB) for trust us to email address “[email protected]” or on the Tor network
[email protected]” (register in the torbox3uiot6wchz.onion and then send your request to our email address)
3. We decrypt your two files and send them to your email.
4. After ensuring the integrity of the files, you must pay us with bitcoin and
send transaction code to our email (get our bitcoin address by email).
5. You get “Black Ruby Decryptor” Along with the private key of your system.
6. Everything returns to the normal and your files will be released.


[What is encryption?]

Encryption is a reversible modification of information for security reasons but providing full access to it for authorised users.
To become an authorised user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files)
you should have an “Personal Identification Key”. But not only it. It is required also to have the special decryption software
(in your case “Black Ruby Decryptor” software) for safe and complete decryption of all your files and data.

[Everything is clear for me but what should I do?]

The first step is reading these instructions to the end. Your files have been encrypted with the “Black Ruby Ransomware” software;
the instructions (“HOW-TO-DECRYPT-FILES.txt”) in the folders with your encrypted files are not viruses, they will help you. After reading
this text the most part of people start searching in the Internet the words the “Black Ruby Ransomware” where they find a lot
of ideas, recommendation and instructions. It is necessary to realise that we are the ones who closed the lock on
your files and we are the only ones who have this secret key to open them.

[Have you got advice?]

[*** Any attempts to get back you files with the third-party tools can be fatal for your encrypted files ***]
The most part of the tried-party software change data with the encrypted files to restore it but this cases damage to the files.
Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put
in its place – the puzzle items will never match, the same way the third-party software will ruin your files
completely and irreversibly. You should realise that any intervention of the third-party software to restore files encrypted
with the “Black Ruby Ransomware” software may be fatal for your files.

If you look through this text in the Internet and realise that something is wrong with your files but you do
not have any instructions to restore your files, please contact your antivirus support.

As you can see, there are plenty of information there and users can get lost at this point. Long story short – they want you to pay them 650 USD in Bitcoins and they will send you a decrypter. This should allow you to unlock those files with .BlackRuby-2 extension.

$650 is a lot of money, even if your files are very important to you. Also, it is never a good idea to pay to criminals – there are no guarantees that they will do what they promised. For those reasons we suggest to select alternative methods to solve this problem.

First things first – remove BlackRuby-2 virus from your computer. This task can be done by reliable anti-malware software, such as Spyhunter. Scan your computer with one of them and the infection should be eliminated.

Then, to restore your files, try to perform system restore based on these instructions. If you have a valid copy of your hard drive that was made before the infection, you should be able to restore your files back to normal. However, if you don’t have a backup, try to use some free decryption tool.

Automatic Malware removal tools

Download Spyhunter for Malware detection

Note: Spyhunter trial provides detection of parasites and assists in their removal for free. limited trial available, Terms of use, Privacy Policy, Uninstall Instructions,

Download Combo Cleaner for Malware detection

Note: Combo Cleaner trial provides detection of parasites and assists in their removal for free. limited trial available, Terms of use, Privacy Policy, Uninstall Instructions, Refund Policy ,

Removal guides in other languages

Leave a Reply

Your email address will not be published. Required fields are marked *