Home Malware Programs Ransomware Bisquilla Ransomware

Bisquilla Ransomware

Posted: June 12, 2019

The Bisquilla Ransomware is a file-locker Trojan that may encrypt, delete, or otherwise damage your media files and ask for a ransom for undoing the attack. While 1.0 samples of the Bisquilla Ransomware omit the encryption, future builds are likely of including it since various, non-consensual routines for encrypting data are available even to amateur programmers. Users should avoid unsafe update resources and use anti-malware programs for deleting the Bisquilla Ransomware at any point.

Your 'Chrome Update' is a Little Weaponized

Even with Ransomware-as-a-Service rentals and spin-offs of Hidden Tear and Github Trojans dominating the landscape, there's room for file-locker Trojans that owe their existence to independent development and low-level programmers with sometimes whimsical motives. The Bisquilla Ransomware is an addition to the slowly-increasing category of Trojans of this payload classification that aren't relatives or variants of a preexisting one. What makes the Bisquilla Ransomware unique is more than just the name (which it announces in its pop-up warning), but its delivery exploit.

The Bisquilla Ransomware uses fake file information, such as a copyright entry, that disguises its installer as being a Chrome browser update with an endorsement from Google. This mask places likely infection vectors as being malvertising: compromised ad networks serving fraudulent update pop-ups. Users who disable their JavaScript, Java, Flash, and ads, in general, may find themselves less at risk from a Bisquilla Ransomware attack.

The Bisquilla Ransomware also takes the unusual step of displaying a pop-up that announces its identity and intentions during the (non-working currently) encryption routine that blocks documents and other media. The Bisquilla Ransomware relies on frightening victims with warnings about loss of data if they take any action that might interrupt its attack. Presumably, a final build of the Bisquilla Ransomware will include ransoming demands, although malware experts see no such details in the 1.0 release.

Patching Browsers the Safe Way

Users can update Chrome through its UI by clicking the 'Customize and control Google Chrome' button, the 'Help' button, and then the 'About Google Chrome' button, which will load any relevant updates. They also can navigate to google.com/chrome for downloading the browser's installer from another Web-browsing application directly. Any other source of Chrome or patches for it always is suspect, even if they contain data that implies that Google endorses them.

Encryption is easily-implemented by most programmers, even at the 'script kiddy' level, but cracking it can be difficult or impossible. Saving backups of any valued documents, pictures, and other media to additional devices can provide an escape from any ransoming leverage that the Bisquilla Ransomware seeks from its victims. Malware experts recommend removable drives and cloud services for this purpose, especially.

Windows users are the only known targets at risk from the Bisquilla Ransomware and should protect themselves with suitable anti-malware solutions for their OS. Two out of seven AV vendors are identifying this threat, but as it's in its early stages of development, malware experts only expect these rates of rising and continue recommending automated means of isolating and uninstalling the Bisquilla Ransomware.

It's not every day that a Trojan tells you who it is or what it's doing, but its warnings and title come with misleading information, too. Mindlessly believing whatever illicit software tells you is a way of getting yourself into a costly situation – but a ransom doesn't have to be the only way out of it.

Loading...