Home Malware Programs Ransomware Bitx Ransomware

Bitx Ransomware

Posted: November 28, 2019

The Bitx Ransomware is a file-locking Trojan from the family of the Crysis Ransomware (AKA the Dharma Ransomware). Besides blocking media for ransoming later, the Bitx Ransomware also removes backups, changes the extensions on file names, and creates ransom letters to the victims. Users can keep both anti-malware tools available for deleting the Bitx Ransomware and backups for recovering without a ransom payment.

Ransomware-as-a-Service Just Wants One Bit (Coin)

With more releases into the Crysis Ransomware family as of late, users have ever-more angles for experiencing attacks from extortion-minded criminals. The Bitx Ransomware is the latest entry in its family, just past the previous Kharma Ransomware and the ROGER Ransomware, although the group's longevity is evident as far back as the Dharma Ransomware and the 'Lavandos@dr.com' Ransomware. Even copy-pasted encryption is a feature that can extort money and endanger thousands of dollars worth of media, as the Bitx Ransomware's payload so well shows.

The Bitx Ransomware's core feature, which defines its threat archetype, is that of encryption, which converts targeted file formats into non-opening copies. The attack runs based on AES encryption, but with extra RSA security for preventing third party researchers from cracking it. Users should be capable of identifying the hostage media by searching for any filenames using the 'bitx' extension merely, along with other, ransom-related data.

Besides the encryption and file hostage-taking tactics, the Bitx Ransomware also includes a feature for removing the Shadow Volume Copies. While the effort isn't always successful, in most cases, it deprives the users of any Restore Points for getting their files back. As usual, however, NAS and other examples of secure, remote storage should remain unaffected, which makes them ideal recovery possibilities.

Of note is that the Bitx Ransomware is using an address that references its ransom quantity of one Bitcoin directly, thereby, taking the guessing work out of the negotiations – although not making them any more reliable necessarily.

Saving All Your Bits for Yourself

Risky browsing behavior or administrative habits are invitations for file-locking Trojans frequently, especially members of the Bitx Ransomware's family and other Ransomware-as-a-Service campaigns. Neglecting software updates can result in threat actors abusing built-in vulnerabilities for remote code execution. Simple passwords can let them break into accounts by brute force. Lastly, interactions with website JavaScript or Flash, or e-mail attachments, can provoke drive-by-downloads. All of these issues are, however, remediable with the appropriate user decisions and settings.

Encryption, while ubiquitous, also isn't difficult for making impenetrable to a third party's cracking efforts. Such is, unfortunately, true of most of the modern versions of the Crysis Ransomware, including the Bitx Ransomware, the SySS Ransomware and the Nvram Ransomware. Although users always can check for help with experienced security researchers, they never should expect decryption's being available. This limitation emphasizes the value of a backup for both the average PC user and business, NGO and government networks.

While its cryptography is secure, the Bitx Ransomware has little invested into its obfuscation or stealth features. The Bitcoins that the Bitx Ransomware is after aren't a surefire promise of getting anything back out of the deal. A ransom is an inherently risk-laden process, but for the unprepared, it can be their only hope of saving what they should have backed up.

Loading...