Bot Ransomware

Bot Ransomware Description

Ransomware threats seem to be the go-to tool when it comes to making a quick buck on the backs of innocent users. However, many cybercriminals are not nearly as high-skilled as they are often portrayed. This is one of the reasons why so many ransomware threats are just slightly altered variants of an already existing threat. This is the case with the Bot Ransomware. This file-encrypting Trojan is a copy of the infamous Dharma Ransomware, which has been pestering users online for quite a while.

Propagation and Encryption

Malware researchers have not come to a definitive conclusion as to how the Bot Ransomware is being propagated. Among the most common ways to spread ransomware threats are spam emails. These emails would often contain a carefully tailored message riddled with social engineering tricks aiming to convince the user to open the file attached to the email. Needless to say, this file is carrying the threat, and launching it would infect your system. Another commonly preferred method is using bogus application updates as an infection vector for spreading ransomware threats. The Bot Ransomware will scan the data on the compromised host to locate the file types, which it was programmed to target. Most data-locking Trojans aim at encrypting as many files as possible to cause maximum damage to the system. The Bot Ransomware applies an encryption algorithm to lock all the targeted files. Once this threat encrypts a file, it also alters its file name. The Bot Ransomware appends a '.id-.[].bot' extension to the newly locked files. After the encryption is completed, you will find that all your data is unusable.

The Ransom Note

After the encryption process has been completed successfully, the Bot Ransomware will drop a ransom note called 'FILES ENCRYPTED.txt.' Using all caps in the name of the ransom note is a rather common practice as it increases the chances of the user spotting the ransom message. In the note, the attackers do not mention the sum, which will be demanded as a ransom fee, but state that the payment will be required in Bitcoin. The authors of the Bot Ransomware urge the user to contact them via email at ‘' They also give out a backup email - ‘' To prove to the victim that they are fully capable of reversing the damage, the attackers state that they will unlock one file free of charge. The only requirements for this file are for it not to exceed 1MB in size and not to contain any information, which can be deemed valuable. The creators of the Bot Ransomware also have included a guide on how to obtain Bitcoins, for the users who are not clued up on the topic.

It is certainly advisable to avoid contacting cyber crooks like the ones behind the Bot Ransomware at all costs. Nothing good comes out of dealingswhich such ill-minded actors. Instead, you should look into obtaining a reputable anti-virus application and use it to wipe off the Bot Ransomware from your PC for good.

Do You Suspect Your PC May Be Infected with Bot Ransomware & Other Threats? Scan Your PC with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Bot Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. Free Remover allows you to run a one-off scan and receive, subject to a 48-hour waiting period, one remediation and removal. Free Remover subject to promotional details and Special Promotion Terms. To understand our policies, please also review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.

Related Posts

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.