• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Bgtx ransomware – A Cryptovirological discovery

October 12, 2018Simeon Georgiev

Dharma ransomware has been around for a while now. This cryptovirological family continues to live and thrive in the cyberspace with the development of its new variants after every couple of months or even weeks. Cybersecurity experts have discovered yet another cryptovirological strain from the Dharma lineage called Bgtx.

As per the initial investigations into the activity of this new Dharma variant, it uses the combination of RSA and AES encryption modules. This combo makes it a really daunting task for ransomware removal experts to crack the encryption. It is nearly impossible to come up with a single decrypter for this type of mixed encryption because it uses a different algorithm for every affected device.

Bgtx ransomware usually distributes its payload through phishing emails and P2P networks. Once it successfully infiltrates the device, it appends every file with a long extension containing attackers’ ID and ‘.Bgtx’. As soon as the encryption completes, every folder on the affected device gets the ransom note in a text file format named FILES ENCRYPTED.

The ransom notes ask the affected users to immediately contact the attackers in order to keep the extortion amount for ransomware removal low. However, it doesn’t specify any particular amount. Moreover, a detailed guideline to buy Bitcoins is also given in the ransom note.

Attackers are also providing decryption guarantee

To ensure users that they have the pertinent solution to unlock the encrypted files, the Bgtx operators are offering free decryption of one non-archived file of less than 1 Mb. They also make it clear that the file sent for free decryption must not contain any valuable information (databases, long excel sheets etc). The attackers also warn the victims to not attempt ransomware removal on their own because it can result in the permanent loss of data.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Ryuk Ransomware Strikes at Popular Canadian Restaurant Chain Next post Instagram Ransomware Actively Targeting Users

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.