BURAN Ransomware

BURAN Ransomware Description

Malware researchers came across a new file-encrypting Trojan recently. It is called the BURAN Ransomware and appears to be an independently built threat, as opposed to most newly emerging data-locking Trojans, which are often just variants of other popular ransomware threats.

Although there is no endorsement as to what the propagation method employed in spreading the BURAN Ransomware is, cybersecurity researchers, speculate that the most common tools may be at play here – pirated software, fraudulent updates, and spam emails containing infected attachments. Once the BURAN Ransomware gains access to a system, it begins the attack by launching a scan with the intention of locating all the files, which will be encrypted. When this is done successfully, the BURAN Ransomware starts the encryption process. When the files have undergone the encryption process of the BURAN Ransomware, they would have their names changed. The BURAN Ransomware applies an extension of randomly generated numbers, which are unique for each victim (for example '.7292BA7F-1643-8E1F-6AC2-D3B47F9992AC'). Then, the BURAN Ransomware will drop its ransom note. The note is called '!!! YOUR FILES ARE ENCRYPTED !!!.txt.' It is a common practice with ransomware authors to use all caps and include symbols when naming the ransom note as it is more likely to attract the attention of the victim. In the note, the attackers inform the victim that their files have been infected and, allegedly, they can help. The authors of the BURAN Ransomware go on to provide the victim with two email addresses where they are meant to be contacted – recovery_server@protonmail.com and recovery1server@cock.li. They insist that the victim sends an email to both addresses.

It is never recommended to contact cybercriminals, let alone pay them money. They are likely to trick you into giving in to their demands and will often fail to provide you with the decryption key you need. A better option is to download and install a reputable anti-malware application and clear your system.

2 Comments