Home Malware Programs Ransomware BOK Ransomware

BOK Ransomware

Posted: June 29, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 1,237
First Seen: June 29, 2017
Last Seen: June 3, 2022
OS(es) Affected: Windows

The BOK Ransomware is a file-locking Trojan that uses encryption to block your media until you pay for the decryptor. Along with not being able to open files such as documents, victims also may experience hijacked wallpapers, unusual filename edits (such as new extensions at the end) or issues with running other programs. Use anti-malware programs to protect your PC and delete the BOK Ransomware, and backups to reduce any potential for data loss to a temporary situation.

Misdeed for the Bargain Price of Ten Percent

Ransomware-as-a-Service, or RaaS as it may be abbreviated, isn't the only kind of encryption-based attack taking place in 2017, but it is a large section of the threat black market. Victims soon may find themselves at the wrong end of another RaaS family's boom with the BOK Ransomware, which is offering its services to independent threat actors at bargain prices. The new Trojan uses symptoms imitating those of the '.locky File Extension' Ransomware in the process of blocking your data and requesting money for it.

The BOK Ransomware uses what malware researchers estimate is a version of the AES-based encryption (although it claims to combine the AES and RSA algorithms for a secure, two-part enciphering process) to lock the local files. Content at risk includes text documents, photos and pictures, spreadsheets, compressed archives, Web pages and other media. Over a hundred formats are compatible with this feature. The BOK Ransomware also may be adding new extensions or other additions to their names, depending on the variables set by its administrator.

After the success of its core attack, the BOK Ransomware uploads the key to unlocking your files to its Command & Control server and loads an image file to lock the screen with a ransoming message. The message is formatted to some versions of the '.locky File Extension' Ransomware identically and asks you to use a TOR Web browser to use the Trojan's payment website. The BOK Ransomware's original authors take ten percent of this fee, with the rest going to the threat actors distributing it.

Cutting out Your Contribution to Undeserved Profit Percentages

While the BOK Ransomware isn't the most polished or sophisticated of the RaaS threats, it arguably makes up for its simplicity with ease of use and affordability. Unless threat actors opt to pay several thousand USD for the source code, the BOK Ransomware requires little upfront investment and operates primarily on an automatic ransom-splitting basis. While the BOK Ransomware's authors claim that the decryption feature triggers with a payment automatically, malware experts can't verify the statement and recommend recovering media from backups instead, if possible.

Parties 'renting' the BOK Ransomware may generate minor variations of the threat with an easy-to-use builder UI, and, then, circulate it in whatever fashion they see fit. Some infection vectors of noteworthy prominence this year include the RIG Exploit Kit, corrupted e-mail attachments, and brute-force attacks for breaking insecure login credentials. Although your anti-malware programs can remove the BOK Ransomware and block the first two infection methods, appropriate user behavior is necessary for having secure backups and passwords.

The BOK Ransomware could be the start of a new tidal wave of RaaS infections or an overly-marketed flop in the dark Web. However, malware experts don't recommend betting on the latter, particularly when Trojans with nearly the same attacks remain as prolific as any con artist could want.

Related Posts

Loading...