Home Malware Programs Ransomware Bitshifter Ransomware

Bitshifter Ransomware

Posted: July 24, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 48
First Seen: July 24, 2017
OS(es) Affected: Windows

The Bitshifter Ransomware is a Trojan that can lock your files by encrypting them, communicates with a remote server for harmful purposes, and may transfer information similarly to spyware. Since its attacks are multifaceted but depend on network connectivity greatly, malware experts recommend that you disable Internet connections for infected PCs. A majority of anti-malware programs can delete the Bitshifter Ransomware as a threat to your PC before its attacks would occur.

Trojans Being Shifty behind the Scenes

What a Trojan seems like it's doing isn't always indicative of its full arsenal of attacks and, even more often than that, just is the tip of the iceberg concerning what harm it may cause to the user. While malware researchers often see file-enciphering Trojans such as the Bitshifter Ransomware building network features into their attacks, this specific threat uses an unusual protocol for its communications. The reasoning for this choice possibly lies in the Bitshifter Ransomware's non-ransom-based features, which its author may intend for collecting information.

On the ransoming half of its payload, the Bitshifter Ransomware conducts standard encryption attacks that corrupt the victim's local files, such as pictures, Office documents, or PDFs, according to a specified algorithm such as AES-128. You also may see filename changes with the attack, such as new extensions that the Bitshifter Ransomware adds after the former ones. Following the addition of new extensions, the Bitshifter Ransomware blocks your media and places a text note on the computer. This file contains the instructions for the victim follow for paying (typically, Bitcoins) to get access to a decryption solution and unlock the files ostensibly.

However, malware researchers also found some less than typical details in the Bitshifter Ransomware's network communications. The Trojan uses the browser-specialized WebSocket platform for its Command & Control server communications and notifies the threat actor of any successful infections automatically. Other details in these non-obfuscated server messages imply that the administrator may use the Bitshifter Ransomware for passing information from the infected system to his C&C server.

Gaming for Free Has Alternate Costs

The Bitshifter Ransomware's ransom instructions, while in English, include numerous grammatical errors and appear to be the byproduct of an automated translation service. Malware researchers also are connecting at least one of the Bitshifter Ransomware's infection vectors to a Russian resource: a fake optimization patch for the Witcher 3 video game. Fake downloads of this type are commonplace on torrent networks and corrupted websites posing as legitimate download sources particularly.

As per most threats of its kind, the Bitshifter Ransomware maintains few symptoms for the victims to see until the encryption finishes blocking their files. Detection rates are rising rapidly, and malware researchers note that most anti-malware programs from reputable security companies should detect and remove the Bitshifter Ransomware, although it's circulating packaged inside a compressed archive. While PC users can try to restore their files through other ways, such as free decryption software, having a backup dating to before the infection is the best recovery method.

Victims of the Bitshifter Ransomware attacks should remember that the symptoms it shows can be incomplete or fraudulent intentionally. Even when the threat in question doesn't seem to be dedicated spyware, changing one's passwords after disinfecting a PC is always a precaution that's worth the trouble.

Loading...