Threat Database Ransomware Baliluware Ransomware

Baliluware Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 4
First Seen: March 8, 2018
Last Seen: April 18, 2018
OS(es) Affected: Windows

The Baliluware Ransomware is an encryption ransomware Trojan. These threat types are designed to take advantage of inexperienced computer users, using a strong encryption algorithm to encrypt the victim's files, which makes them inaccessible, and then demanding the payment of a ransom from the victim. There has been a noticeable elevation in the number of the Baliluware Ransomware attacks in the last year, due to the increased abundance of open source ransomware engines and RaaS (Ransomware as a service) platforms specifically, which allow the cybercrooks to create their own custom ransomware versions to carry out attacks.

Symptoms of a Baliluware Ransomware Infection

The Baliluware Ransomware is based on HiddenTear, an open source ransomware platform that has been available since August 2015. Since HiddenTear was released, it has been responsible for countless ransomware variants. The Baliluware Ransomware, just one more of these variants, was first observed on February 23, 2018, and studied by PC security researchers. The Baliluware Ransomware is typically delivered to victims through the use of spam email messages, which will contain a file attachment with embedded macro scripts that download and install the Baliluware Ransomware onto the victim's computer. Because of this, learning to handle spam email messages and these unwanted file attachments safely is a crucial part of preventing threat attacks like the Baliluware Ransomware.

How the Baliluware Ransomware Carries out Its Attack

Once the Baliluware Ransomware is installed on the victim's computer, it will use a strong encryption algorithm to encrypt the victim's files. The Baliluware Ransomware will search for the user-generated files, targeting a wide variety of file types while avoiding the Windows system files. This is because the Baliluware Ransomware requires Windows to remain functional so that the victim can read a ransom note and pay the ransom amount. The following are the file types that may be encrypted by the Baliluware Ransomware attack, as well as in other HiddenTear variants:

.3gp, .7z, .apk, .avi, .bmp, .cdr, .cer, .chm, .conf, .css, .csv, .dat, .db, .dbf, .djvu, .dbx, .docm, doc, .epub, .docx .fb2, .flv, .gif, .gz, .iso .ibooks,.jpeg, .jpg, .key, .mdb .md2, .mdf, .mht, .mobi .mhtm, .mkv, .mov, .mp3, .mp4, .mpg .mpeg, .pict, .pdf, .pps, .pkg, .png, .ppt .pptx, .ppsx, .psd, .rar, .rtf, .scr, .swf, .sav, .tiff, .tif, .tbl, .torrent, .txt, .vsd, .wmv, .xls, .xlsx, .xps, .xml, .ckp, .zip, .java, .py, .asm, .c, .cpp, .cs, .js, .php, .dacpac, .rbw, .rb, .mrg, .dcx, .db3, .sql, .sqlite3, .sqlite, .sqlitedb, .psd, .psp, .pdb, .dxf, .dwg, .drw, .casb, .ccp, .cal, .cmx, .cr2.

The Baliluware Ransomware will mark the files encrypted by its attack with the following file extension, which it will add to the file's name:

'.YOU-ARE-FUCKED-BY-BALILUWARE-(CODED-BY-HEROPOINT)'

There is nothing to differentiate the Baliluware Ransomware from the many other ransomware Trojans based on the HiddenTear platform. The Baliluware Ransomware will not deliver a ransom note after encrypting the victim's files so that there is no way for the victims of the Baliluware Ransomware attack to contact the cybercrooks or recover their files. This is just as well since in most cases of ransomware Trojan infections, the victims will not recover their files even after they make the ransom payment.

Protecting Your Data from the Baliluware Ransomware and Other HiddenTear Variants

The best protection against the Baliluware Ransomware and other ransomware Trojans that use a similar attack is to have file backups on the cloud or an external memory device. Malware experts advise computer users to have file backups on the cloud or an external memory device. Having the ability to restore the files from a backup means that victims do not need to pay a ransom since it will remove any leverage that the extortionists have that allows them to stipulate a ransom payment from the victim. Having file backups, combined with a reliable security program that is fully up-to-date is the best protection against the Baliluware Ransomware and similar threats.

Trending

Most Viewed

Loading...