Threat Database Ransomware Bat Ransomware

Bat Ransomware

By GoldSparrow in Ransomware

Another ransomware threat was recently spotted by cybersecurity researchers. They named it the Bat Ransomware, and when examining it, the malware experts concluded that this is a file-encrypting Trojan, which belongs to the notorious Dharma Ransomware family. Ransomware threats are easy to modify and even easier to spread; this is why they are becoming popular in the world of cybercrime increasingly. People with questionable morals who operate in these corners of the Internet do not tend to pass on an opportunity to make some quick money with very little effort.

The usual methods of spreading ransomware threats is via pirated software, which has been corrupted, fake update notifications and spam email. Researchers speculate that Bat Ransomware is no different in this regard. If you fall for the Bat Ransomware and it manages to infiltrate your computer, it would detect all the files it was programmed to target, after scanning your PC. The next step of the Bat Ransomware attack is the encryption process. The files targeted will be locked, and an additional extension would appear on every file that has been affected by the Bat Ransomware. This extension follows the pattern '.id-.[idecryptyourdata@cock.li].bat,' which would indicate that each victim would be assigned a uniquely generated ID by the file-locking Trojan. The creators of the Bat Ransomware do not say what the exact fee would be for the decryptor they are offering, but provide the user with two email addresses where the victim is meant to get in touch with the attackers and receive instructions. The addresses given out are 'idecryptyourdata@cock.li' and 'decryptyourdata@qq.com.'

We would always urge you to stay away from cybercriminals like the ones responsible for the Bat Ransomware as they more often than not will not hold up their end of the deal but would gladly take your hard-earned money. A good approach, instead, would be to download a legitimate anti-spyware application and let it clear your computer of this pest. Next, you may look into a third-party data-recovery application, which may be able to recover some of the affected data.

Related Posts

Trending

Most Viewed

Loading...