Home Malware Programs Ransomware Baliluware Ransomware

Baliluware Ransomware

Posted: February 27, 2018

The Baliluware Ransomware is a version of Hidden Tear, a file-locking Trojan that can prevent you from opening content such as images, documents, archives, spreadsheets or music. Other symptoms that a victim can expect from the Baliluware Ransomware infections include the appearance of pictures or text files asking for ransom money, as well as changes to the names and extensions of anything that the threat locks. Various anti-malware products can identify and remove the Baliluware Ransomware as a threat to your computer, and creating backups can reduce any damages associated with its file-locking behavior.

When a Growing Extension Means Growth for Wrong Ransoms

The Turkish programmer Utku Sen is responsible for handing illicit general access to an easy-to-use resource for creating new versions of file-locking Trojans, although other freeware sources also abound. Recent campaigns utilizing HT's code include the Korean RansomUserLocker Ransomware and File-Locker Ransomware, the multi-language Genocheats Ransomware, as well as the Ordinal Ransomware and its variants, like the Katafrack Ransomware. Malware researchers only are just adding another version to this pool: the Baliluware Ransomware.

Like almost every version of Hidden Tear seen, so far, the Baliluware Ransomware is a Windows-specific application that conducts non-symptomatic, AES-based encryption attacks. After installing itself, the Trojan runs a background process for targeting files that can include PDF or DOC documents, Excel spreadsheets, pictures like BMPs or JPGs, and other media. The Baliluware Ransomware encrypts these non-system files and tags them with its extension addition ('.YOU-ARE-FUCKED-BY-BALILUWARE-(CODED-BY-HEROPOINT)'), which is unusually lengthy. This 'locked' content can't open again until the victim decrypts it, usually, with a custom decryption tool.

Malware experts still are examining the Baliluware Ransomware's ransom-based components. However, the threat actor, 'Heropoint,' shows limited programming knowledge in his alterations to the program's file-locking password generation routine, and is likely of being young or inexperienced in the industry. Since there always is a high-risk for fraud, users should ignore any ransom demands from the Baliluware Ransomware, if any other ways of restoring their files remain untested especially.

Being a Hero to Your Computer's Files

Hidden Tear isn't one of the most complex, file-locking threats in the experience of malware experts, but does include the real danger of locking files in such a way as to keep their data from being accessible. Users always can use backups for recovery purposes without breaking the Baliluware Ransomware's encryption method. If decoding the encryption algorithm is mandatory, any victims should contact an appropriate anti-malware researcher for further recommendations and access to freeware decryption tools.

Although Heropoint makes minor changes to the Baliluware Ransomware's password-creating function, he has failed to add any extra security against threat-detecting tools. The Baliluware Ransomware's campaign may be circulating the Trojan throughout the Web in various ways, including e-mail attachments, compromised advertising networks, and torrents. A majority of professional anti-malware products should delete the Baliluware Ransomware safely and keep it from accessing your files.

Hidden Tear gives data hostage-taking tactics to almost anyone without compunctions about breaking the law. PC owners not wanting Heropoint's the Baliluware Ransomware to make money out of their work and belongings shouldn't forget to make the occasional backup.

Loading...