8lock8 targets Windows OS, is based on Hidden Tear, and is distributed via malicious attachments in spam emails and through file sharing networks. It uses AES-256 to encrypt files and appends .8lock8 to the file names. After the encryption process is complete, 8lock8 creates a ransom note named READ_IT.txt and places it in each folder that contains the encrypted files.

  • PC Risk provides more information about 8lock8 here.
  • Bleeping Computer provides a free decryption tool for 8lock8 within its forums here.