Threat Database Ransomware Bud Ransomware

Bud Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 3
First Seen: September 18, 2017
Last Seen: December 5, 2018
OS(es) Affected: Windows

The Bud Ransomware is an encryption ransomware Trojan that was observed for the first time on September 15, 2017. The Bud Ransomware tends to spread using spam email attachments, which download and install the Bud Ransomware on the victim's computer through the use of corrupted macro scripts. Because of this, the macros need to be disabled unless necessary since they may be used to deliver threats to the victims that do not practice proper handling of spam email attachments. Being able to recognize these tactics and be protected adequately is a must do to ensure that your data stays safe. The Bud Ransomware's main purpose, like most encryption ransomware Trojans, is to encode the victim's files with a strong encryption method and then demand a ransom payment in exchange for the decryption key necessary to recover the affected files.

What the Bud Ransomware Does to Your Files

Once the Bud Ransomware has been installed, it will use a strong encryption method to make the victim's files inaccessible. The Bud Ransomware will identify the files encrypted by its attack with the file extension '.bud,' added to the end of each affected file. Once the Bud Ransomware encrypts a file in its attack, it will no longer be redeemable without the decryption program, which the con artists hold in their possession. The Bud Ransomware will target user-generated files, looking for images, music, videos, spreadsheets, texts, configuration files, archives, and numerous other files types, while making sure that the Windows operating system remains functional so that the victim can still view a ransom note and carry out a ransom payment.

How the Bud Ransomware Demands Its Ransom Payment

After the Bud Ransomware encrypts the victims' files, the Bud Ransomware will demand a ransom payment. The Bud Ransomware displays a program window that includes an image of a human skull. The Bud Ransomware's ransom note reads as follows:

'0oops, your important files are encrypted! If you see this text, then your files are no longer accessible, because they have been encrypted. Perhaps you are busy looking for a way to recover your files
Nobody can recover your files without our decryption key. We guarantee that you can recover your files safely and easily.
All you need to do is to submit the payment to the BTC address down below. After the payment is sent, click the check -(payment button) and you get your files back. Don't try to close me or to restart the computer. The fun starts now, every hour more files will get lost forever, so hurry up!
localbitcoins.com bitoanda.com
[60 MIN COUNTDOWN TIMER]
More files get lost every hour!
[View encrypted files|button]
Send 500€ to the bitcoin address:
[RANDOM CHARCTERS]
[I want my files back, check if payment was made!|button]'

Although the Bud Ransomware ransom note urges the victims to pay within one hour, PC security researchers advise PC users to abstain from making this ransom payment. It is very unlikely that the con artists will keep track of their victims' payment and provide decryption keys to those that make the payment. It is much likelier that the con artists will simply ignore the victim's payment. Computer users should restore their encrypted files from a backup copy instead of paying the Bud Ransomware ransom.

Dealing with the Bud Ransomware

Having backup copies of your data can prevent the Bud Ransomware’s nocive effects. If computer users have backups on the cloud or an external memory device, then the people responsible for the Bud Ransomware attack lose any leverage they have over the victim. The use of backups together with a reliable security program that is fully up-to-date is the most secure way to ensure that your data is safe from threats like the Bud Ransomware and other encryption ransomware Trojans.

Registry Details

Bud Ransomware may create the following registry entry or registry entries:
Regexp file mask
%LOCALAPPDATA%\Corel\CorelCGS.exe

Related Posts

Trending

Most Viewed

Loading...