BitStak Ransomware
Posted: July 11, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 22 |
First Seen: | July 11, 2016 |
---|---|
OS(es) Affected: | Windows |
The BitStak Ransomware is a Trojan that encrypts the contents of specific directories on your PC and then displays an image asking you to pay for decryption assistance. Since the BitStak Ransomware includes an extensive range of folders under its attacks, malware experts advise using backups kept on a separate drive or server to recover from this threat. Even if you don't need to decrypt your data, an appropriate response to this Trojan's symptoms always should include using anti-malware programs for removing the BitStak Ransomware in totality.
A Campaign for Scrambled File Names and Lightened Bank Accounts
Although many of the most basic attacks rotate between similar types of threatening software, minor differences in how their campaigns present themselves can be indications of differing authorship or familial relations. For early July, malware researchers could point out the BitStak Ransomware, which avoids using the ID-based system preferred by other file encryptors, and includes all of its ransom demands in a 'lock screen' style image. However, as with any hostile file encryptor, the BitStak Ransomware still will encrypt and thereby block any use of data in exchange for a possible ransom.
The BitStak Ransomware bases its attacks on both the extension each file uses, as well as its location. Besides targeting the standard document and media-based formats, the BitStak Ransomware also makes the notable inclusion of attacking program executable (EXE) files. General documents, downloads, and temporary app data directories all are targets. However, malware experts note the BitStak Ransomware's including the Program Files directories as being most broadly damaging to any applications installed under default settings particularly.
The BitStak Ransomware's unidentified encryption method encodes each file matching the above qualifications. The Trojan also appends a '.the BitStak' extension, along with a seemingly random string of characters that overwrites the original name in its entirety. After completing these tasks, the BitStak Ransomware loads a ransom message that replaces the victims' desktops with a message telling them to make a Bitcoin payment to decrypt their files.
A Cost-Friendly Alternative to Giving Con Artists a Stack of Bitcoins
Compared to Trojans like the Mircop Ransomware that demand thousands of dollars to restore your personal information, the BitStak Ransomware's forty-five USD value fee is relatively cheap. In spite of that low asking price, victims still should look at other options for data recovery whenever practical. With freely downloadable decryptors for the BitStak Ransomware already available, PC owners always should attempt these safer recovery options before giving the con artists a reward for their attacks.
Other forms of protection for the BitStak Ransomware attacks can take the form of backing up invaluable information. Although local-based backups may be at risk, malware experts find no cloud account-compromising features among the BitStak Ransomware's payload features. Detachable backup drives also are an efficient way of keeping your data out of the hands of the BitStak Ransomware and similarly-classified threats. You also may reinstall any programs that the BitStak Ransomware damages.
The BitStak Ransomware may load its ransom image through methods that block out your access to other software or Windows features. Booting through the Safe Mode feature or, at worst, a separate recovery drive can avoid these desktop-locking attacks. Then you may remove the BitStak Ransomware with any qualified anti-malware product and commence with the data recovery options of your preference.