Home Malware Programs Ransomware Bondy Ransomware

Bondy Ransomware

Posted: October 30, 2020

The Bondy Ransomware is a file-locking Trojan without a known family currently. The Bondy Ransomware can harm users' access to their documents, pictures, and similar media through encrypting the files and sends ransom notes to victims afterward. Properly-secure backups will help with inexpensive recovery of the data, and professional PC security solutions should properly delete the Bondy Ransomware.

A Black Hat Service that Windows Users Can Ditch

A relative enigma with the Bondy Ransomware name is appearing as quiet competition to the vastly-larger Ransomware-as-a-Service families of the year. Since malware experts can't confirm links between the Bondy Ransomware and well-known Trojan groups, it's quite likely to be an independent or pet project of some unscrupulous programmer. Its history is clouded, but its intent readily explains itself: stopping files from opening and making a little money from it.

The Bondy Ransomware is a 32-bit Windows program that requires the .NET Framework. Some samples of the Bondy Ransomware include fake names that portray them as 'Host Process' files for Windows, which offers a probable disguise while it conducts its attacks in the background. Like most file-locking Trojans, its visible payload consists of three parts: encryption for locking media files, extensions for identifying that media, and ransom notes – in this case, text files – that sell a file recovery service.

Malware researchers also see several other features in the Bondy Ransomware worth notice. Out of them, the most important for a victim is the Trojan's typical capacity for deleting the Restore Points or the Shadow Volume Copies. It also can disable some of Windows's safety and network features, such as proxies and security zones selectively.

The Danger that Even the Cheapest Ransom Carries

As far as its extortion goes, the Bondy Ransomware is a meager Trojan that asks for only two hundred USD – much less than, for instance, the STOP Ransomware or another Ransomware-as-a-Service. Since these values are most appropriate for home users and random targets instead of business's networks, malware experts recommend watching out for infection exploits typical for such demographics. Examples might include e-mail spam with attached files or torrents for copyright-protected movies or game cracks.

General-purpose security steps also are necessary for all Windows users who want their files safe from the Bondy Ransomware encryption strategy and extortion. Always save backups on other devices, prevent non-secure access to Remote Desktop features, and turn off risky features like JavaScript, Java and Flash. Server and network admins also are responsible for choosing passwords that attackers can't break through with brute-force.

Although there are no known recovery solutions to the Bondy Ransomware, it shows few features for preventing its detection or removal. Users can depend on their preferred anti-malware and security services for streamlining the quarantining or uninstalling of the Bondy Ransomware.

The Bondy Ransomware has its sights aimed at low-hanging fruit, but such a point of view may well serve lazier threat actors. With a sufficiently low-effort distribution tactic, it could become 'free money' to an attacker as long as it finds a few Windows users without backups or security.

Loading...