Buma Stemra Virus

Also Known As: Buma Stemra Ransomware
Damage level: Severe

What is Buma Stemra?

The Buma Stemra message blocks computer users' screens, demanding payment of a 100 Euro fine for allegedly downloading copyrighted music files. This is a scam, a message created by cyber criminals that has no connection with the legitimate organization called Buma Stemra.

Fake messages such as these, which exploit the names of various authorities and organizations, are called ransomware infections. The main purpose of creating these messages is to trick unsuspecting PC users into paying bogus fines - money which is sent to cyber criminals.

This particular ransomware infection targets PC users from the Netherlands, exploits the name of Buma Stemra, and originates from a family of rogue screen lockers called Gimemo.

Buma Stemra virus (Netherlands)

This ransomware family is known to exploit the names of various organizations related to music copyright services in various countries (commonly, ransomware infections exploit the names of local authorities).

Other known screen lockers targeting PC users from the Netherlands exploit the names of Politie Korps Landelijke and Politie Eenheid Voor De Bestrijding Cybercrime in order to add authenticity and scare unsuspecting users into paying the bogus fines. If you see a message from Buma Stemra blocking your screen, your PC is infected - do not pay, since this is a scam.

Buma Stemra is one of many organizations whose names are exploited by cyber criminals in order to extort money from unsuspecting PC users. These ransomware infections are often distributed using various Trojans and drive-by downloads. PC users should be especially careful when downloading software updates and video codecs from the Internet.

To remain safe, only download from legitimate sources. Another common infiltration method used by Buma Stemra and other viruses is via security vulnerabilities detected on PCs. To mitigate this risk, protect your PC by keeping your operating system and installed software updated. If your PC is already infected with this scam, use the removal guide provided to eliminate it.

A fake message displayed by the Buma Stemra virus:

Buma Stemra

Illegaal ge downloade muziek stukken ("door piraterij verkregen") zijn gelegen op de computer. Met je clownloaden de liedjes zijn gekopieerd, zodat kan ook een strafbaar feit onder § 106 van cue Auteurswet.
Het downloaden van auteursrechtelijk beschermde liedjes via het internet of om muziek te delen netwerk is illegaal en is in overeenstemming met 5100 van de Copyright A. m. een geldboete of een gevangenisstraf van een boete van maximaal 3 jaar. Bovendien kan de eigendom in de zin van 511* paragraaf 3 van het Wetboek van Strafrecht strafbaar feit en ook leiden tot de inbeslagname van de computer, vmarmee de bestanden zijn gedownload.

Instant automatic malware removal: Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

Quick menu:

Buma Stemra virus removal:

Step 1

Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer starting process press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, then select Safe Mode with Networking from the list.

Safe Mode with Networking

Video showing how to start Windows 7 in "Safe Mode with Networking":

Step 2

Log in to the account infected with the Buma Stemra virus. Start your Internet browser and download a legitimate anti-spyware program. Update the anti-spyware software and start a full system scan. Remove all entries detected.

If you cannot start your computer in Safe Mode with Networking, try performing a System Restore.

Video showing how to remove ransomware virus using "Safe Mode with Command Prompt" and "System Restore":

1. During your computer starting process, press the F8 key on your keyboard multiple times until the Windows Advanced Options menu appears, and then select Safe Mode with Command Prompt from the list and press ENTER.

Boot your computer in Safe Mode with Command Prompt

2. When Command Prompt Mode loads, enter the following line: cd restore and press ENTER.

system restore using command prompt type cd restore

3. Next, type this line: rstrui.exe and press ENTER.

system restore using command prompt rstrui.exe

4. In the opened window click "Next".

restore system files and settings

5. Select one of the available restore points and click "Next" (this will restore your computer's system to an earlier time and date, prior to the ransomware infiltrating your PC).

select a restore point

6. In the opened window click "Yes".

run system restore

7. After restoring your computer to a previous date, download and scan your PC with recommended malware removal software to eliminate any remnants of Buma Stemra virus.

If you cannot start your computer in Safe Mode with Networking (or with Command Prompt), boot your computer using a rescue disk. Some variants of ransomware disable Safe Mode, making its removal complicated. For this step, you need access to another computer.

After removing the Buma Stemra virus from your PC, restart your computer and scan it with legitimate antispyware software to remove any possible remnants of this security infection.

Other tools known to remove the Buma Stemra virus:

▼ Show Discussion

About the author:

Tomas Meskauskas

Tomas Meskauskas - expert security researcher, professional malware analyst.

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

QR Code
Buma Stemra Ransomware QR code
Scan this QR code to have an easy access removal guide of Buma Stemra Ransomware on your mobile device.
We Recommend:

Get rid of Windows malware infections today:

Download Combo Cleaner

Platform: Windows

Editors' Rating for Combo Cleaner:
Editors ratingOutstanding!

[Back to Top]

To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.