Home Malware Programs Ransomware Boston Ransomware

Boston Ransomware

Posted: June 10, 2019

The Boston Ransomware is a file-encryption Trojan based on the STOP Ransomware project. It uses an advanced file-encryption routine that is impossible to reverse without acquiring the private encryption key that is stored on the server of the attackers. Of course, they would not be providing this information free of charge, and they demand to be compensated in Bitcoin in exchange for this information. We assure you that paying money to the Boston Ransomware’s authors is a terrible idea since they will deliver their part of the deal rarely.

It is likely that victims of the Boston Ransomware are reached via a fake phishing email that contains a harmful attachment – often it might be a simple document or an archive. Upon launch, this attachment would initialize the Boston Ransomware and begin encrypting the files found on the victim’s hard drive. Of course, the Boston Ransomware only encrypts particular file formats, therefore ensuring that the users’ computers will still be usable and their programs will run fine. However, victims of the Boston Ransomware will end up losing all of their documents, images, videos, archives, music, and other commonly used file formats. The Boston Ransomware will mark the names of encrypted files by using the ‘.boston’ extension.

After the attack is made, the Boston Ransomware drops a ransom note called ‘_readme.txt’ that contains contact details and payment instructions. The perpetrators use the email stoneland@firemail.cc for communication and provide a Bitcoin wallet address where victims should send the payments to. As mentioned above, trusting the criminals and sending them money is out of the question so that you should look for a solution that involves using reputable software. The first step towards recovery is to eliminate the Boston Ransomware by using a suitable anti-malware utility. Then, you should try data recovery tools and methods that might help you to bring some of your files back to normal.

Loading...