Threat Database Ransomware '.BDKR File Extension' Ransomware

'.BDKR File Extension' Ransomware

By GoldSparrow in Ransomware

The '.BDKR File Extension' Ransomware is an encryption ransomware Trojan that is commonly associated with the LockCrypt 2.0 Ransomware, a preexisting ransomware threat. These two threats are nearly identical, with the main difference being an updated set of Command and Control servers in the case of the '.BDKR File Extension' Ransomware. The '.BDKR File Extension' Ransomware carries out a typical version of the encryption ransomware Trojan attack, encrypting the victim's files in an effort to demand a ransom payment from the victim.

How the '.BDKR File Extension' Ransomware Enters a Computer

The '.BDKR File Extension' Ransomware is designed to make the victim's files inaccessible. The '.BDKR File Extension' Ransomware uses a strong encryption algorithm to make the victim's files inaccessible, essentially taking them hostage. The '.BDKR File Extension' Ransomware targets a wide variety of file types in this attack, renaming all the affected files by adding the file extension '.BDKR' to the end of the affected file's name. The files that threats like the '.BDKR File Extension' Ransomware target in these attacks include:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The '.BDKR File Extension' Ransomware delivers its ransom note in the form of a text file named 'How To Restore Files.txt,' which contains the following message:

'Important !!!
Ypur personal id - YJVTJ+1M-AIC05q
Warning: all your files are infected with an unknown virus.
To decrypt your files, you need to contact at [email address].
The decoder card is received by Bitcoin.
You can buy bitcoins from the following links://bblockchain[.]info/wallet
Do not try to restore files your sel, this will lead to the loss of their files forever
DUARANTEES!!!
Yo ucan send us 2-3 encoded files.
And attach for testing, we will return them to you for FREE'

Protecting Your Data from Threats Like the '.BDKR File Extension' Ransomware

The best protection against threats like the '.BDKR File Extension' Ransomware is to have backup copies of your data. These backup copies will ensure that there is no need to pay the '.BDKR File Extension' Ransomware ransom or contact these criminals. Apart from having backups of your data, malware researchers also recommend having a good security program that is fully up-to-date to ensure that the '.BDKR File Extension' Ransomware can be intercepted or removed before it can cause permanent damage. Unfortunately, when a threat like the '.BDKR File Extension' Ransomware encrypts a computer's files they may not be recoverable without the decryption key so that it is crucial to ensure that preventive measures are in play.

Trending

Most Viewed

Loading...