Threat Database Ransomware Bom Ransomware

Bom Ransomware

The Bom Ransomware aims to infect targeted computers, initiate an encryption routine that locks the files stored there, and then extort its victims for money. The Bom Ransomware is a potent malware threat part of the VoidCrypt family. Whenever the Bom Ransomware locks a file, it will append '.bom' to that file's original name. After completing its encryption process, the threat will deliver a ransom note with instructions for the affected users. The note will be placed in a text file 'Scratch.' Most ransomware threats make sure that their victims would notice the note-bearing files easily by dropping them in immediately visible places such as the Desktop or every folder with encrypted data. The Bom Ransomware, however, generates the 'Scratch' file only in the 'C:\Users' folder.

According to the instructions, the first step that users must take is to locate a file named 'prvkey*.txt.key.' The asterisk symbol could instead be a number. The cybercriminals point out that file is vital for the potential restoration of the encrypted data and tampering with it could lead to permanent losses. The 'prvkey*.txt.key' must be sent to the email address of the hackers - 'tormented.soul@tuta.io.' Users are allowed to also attach a couple of encrypted files that are less than 1MB in size. These files will supposedly be decrypted and returned. The note doesn't mention the exact size of the ransom demanded by the hackers. However, it is specified that the transaction must be done using the Bitcoin cryptocurrency.

The full text of the instructions delivered by Bom Ransomware is:

'All Your Files Has Been Encrypted

You Have to Pay to Get Your Files Back

1-Go to C:\ProgramData\ or in Your other Drives   and send us prvkey*.txt.key  file ,  *  might be a number (like this : prvkey3.txt.key)

2-You can send some file little than 1mb for Decryption test to trust us But the test File should not contain valuable data

3-Payment should be with Bitcoin

4-Changing Windows without saving prvkey.txt.key file will cause permanete Data loss

Our Email:tormented.soul@tuta.io

in Case of no Answer:'

Related Posts

Trending

Most Viewed

Loading...