Home Malware Programs Ransomware BASS-FES Ransomware

BASS-FES Ransomware

Posted: November 21, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 115
First Seen: September 29, 2021
Last Seen: July 4, 2023
OS(es) Affected: Windows

The BASS-FES Ransomware is a variation of the Hidden Tear file-locking Trojan, and, like the original version of that threat, can block you from opening files by enciphering them. This Trojan also generates Notepad messages requesting money for restoring any files it locks and may make false claims about its additional features, such as uploading data over a network. Malware researchers continue advising that users preserve their media with backups and anti-malware protection that can delete the BASS-FES Ransomware as soon as they detect it on the PC.

The Worst Service Notice You can Get

Since it's very straightforward to modify Utku Sen's Hidden Tear project for illegal and profitable purposes, many threat actors of unrelated groups are distributing their custom variants of this software. The latest edition of this file-locking Trojan is arriving with no programming or cryptography changes but does deliver messages that deceive the user about its attack features intentionally. This threat, the BASS-FES Ransomware, is not visible in the wild currently, despite being already functional.

The focal point of the BASS-FES Ransomware's payload is identical to that of the original Hidden Tear: a data-encrypting feature that can search for different files on the PC and lock them with an AES-based cipher. The threat actors may choose to sort which media they target by blocking specific formats, like Word documents, or avoiding locations like the Windows folder. The BASS-FES Ransomware displays no user interface while doing so.

Malware experts have found no duplicates of the BASS-FES Ransomware's Notepad-based 'service notices' in the campaigns of other Trojans, including the numerous variants of Hidden Tear. This note, which the BASS-FES Ransomware drops after blocking the victim's digital media, identifies the Trojan, demands a single Bitcoin in payment for a decryption service, and claims that the Trojan also is uploading your locked data to a cloud server. This last feature isn't a default part of the HT family, and malware experts are, so far, verifying that the BASS-FES Ransomware does not include it.

Pulling Your Files out of a Trojan's Encryption System

File-locking Trojans are active threats to both any locally saved files and files that the users store on open-access devices, including any network or removable drives protected inadequately. The BASS-FES Ransomware's ransom converts to over eight thousand US dollars and should be withheld, if possible, by victims until after they test all practical, free substitutes for recovering their files. Besides backups to defend your media proactively, malware experts also recommend sampling the compatibility of current decryption programs for Hidden Tear that various organizations in the AV sector provide at no cost.

The BASS-FES Ransomware works as its threat actor intends and can damage a comprehensive range of media in a Windows environment. However, its underlying campaign has not entered into a status of full distribution to either public or private entities, and malware experts only can estimate its possible infection methods. Use traditional anti-malware products to delete the BASS-FES Ransomware in any common disguises, such as fake e-mail attachments, or uninstall it from your computer after it attacks.

The BASS-FES Ransomware's delivering fraudulent information along with its premium solution intentionally raises the point of how trustworthy its threat actor might be. As common sense might indicate, the people who are willing to attack your PC and lie to you in the bargain may not be the best choice of people to trust for recovering what's yours.

Loading...