Threat Database Ransomware Bgzq Ransomware

Bgzq Ransomware

Upon analyzing newly discovered malware threats, cybersecurity researchers have concluded definitively that Bgzq functions as a highly threatening form of ransomware. Once activated on a compromised device, Bgzq encrypts various types of data, rendering it inaccessible and effectively unusable for the victim. The ransomware also alters the original filenames of the affected files by appending the '.bgzq' extension. For example, a file originally named '1.png' would be transformed into '1.png.bgzq,' and '2.pdf' would become '2.pdf.bgzq,' and so forth. Additionally, Bgzq generates a ransom note in the form of a text file named '_README.txt.'

Security experts are cautioning that the Bgzq Ransomware represents yet another addition to the infamous STOP/Djvu Ransomware family. Historically, the threat actors responsible for spreading STOP/Djvu variants have frequently integrated additional malware, such as Vidar or RedLine, into their attacks, further exacerbating the damage caused to victims.

The Bgzq Ransomware Takes Victims' Data Hostage and Demands Ransom Payments

The ransom note associated with the Bgzq Ransomware begins with a reassurance to the victim, emphasizing the possibility of file recovery. It elaborates that various file types, spanning from pictures to databases and documents, have undergone encryption using robust encryption methods coupled with a unique key. The note stresses that the exclusive method for file recovery entails the acquisition of a decrypt tool and the corresponding unique key.

To instill confidence, the perpetrators extend a guarantee, permitting the victim to submit one encrypted file for complimentary decryption, serving as evidence of their capability to unlock the files. However, they stipulate that the chosen file must not contain valuable information. The only available means of communication provided within the document are two email addresses: '' and ''

The ransom demand is explicitly outlined as $999 for the private key and decryption software, with a 50% discount offered if contacted within the initial 72 hours, effectively reducing the price to $499. Each victim receives a distinct personal ID for identification purposes.

It's essential to highlight that STOP/Djvu Ransomware employs sophisticated techniques to evade detection. These threats typically commence their operation by executing shellcodes and loading a library (msim32.dll) for obfuscation. To further evade detection, they often utilize loops to extend execution time and dynamically resolve APIs. Bgzq may additionally employ process hollowing, replicating itself as a benign process to disguise its malicious intent. These strategies collectively aim to bolster resilience against detection and interception.

How to Better Protect Your Devices and Data from Malware and Ransomware Threats?

Users improve the protection of their devices and data from malware and ransomware threats by implementing a comprehensive set of proactive measures. Some of the essential measures include:

  • Install Reliable Security Software: Utilize reputable anti-malware software on all devices, including tablets, computers and smartphones. Ensure that these applications are regularly updated to uncover and remove both known and emerging threats.
  • Keep Software Updated: Regularly update operating systems, applications, and software programs to patch security vulnerabilities. Many malware attacks exploit known weaknesses that could be minimized by staying up-to-date with the latest software patches and updates.
  • Enable Firewall Protection: Activate firewalls on devices and network routers to monitor the incoming and outgoing traffic. Firewalls act as a barrier between devices and potential threats by helping to prevent unauthorized access and the spread of malware.
  • Exercise Caution with Email and Downloads: Always be watchful when opening email attachments or downloading files from the internet, especially from unknown or unverified sources. Malware often spreads through email phishing campaigns and deceptive websites.
  • Use Strong, Unique Passwords: Create strong and unique passwords for all accounts and devices, and avoid using the same password across multiple accounts.
  • Implement Two-Factor Authentication (2FA): Enable Two-Factor Authentication when possible as an extra layer of security to accounts. Two-Factor Authentication needs a second form of verification, which includes a password and a code that needs to be retrieved from a mobile device.
  • Backup Data Regularly: Establish a regular backup routine to ensure that essential data is securely stored and can be recovered in the event of a ransomware attack or data loss. Backup data to an external hard drive, cloud storage service, or both.
  • Stay Informed and Educated: Stay on top of recent cybersecurity threats and best practices for protection. Educate yourself and others in your household or organization about recognizing and circumventing potential threats, including phishing emails and unsafe websites.

By implementing these proactive measures and staying vigilant, users can significantly cut down the risk of malware and ransomware infections and better protect their devices and data.

The text of the ransom note generated by the Bgzq Ransomware is:


Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
Do not ask assistants from youtube and recovery data sites for help in recovering your data.
They can use your free decryption quota and scam you.
Our contact is emails in this text document only.
You can get and look video overview decrypt tool:

Price of private key and decrypt software is $999.
Discount 50% available if you contact us first 72 hours, that's price for you is $499.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID:'

Bgzq Ransomware Video

Tip: Turn your sound ON and watch the video in Full Screen mode.


Most Viewed