Home Malware Programs Ransomware Bot Ransomware

Bot Ransomware

Posted: October 29, 2019

The Bot Ransomware is a file-locking Trojan from the Dharma Ransomware's group, a sub-division of the Crysis Ransomware's family. Symptoms of infections include problems with opening the files that the Trojan encrypts, changes to their names, the appearance of ransoming messages, and other attacks. Users can backup anything of value for preservation and depend on their anti-malware programs for removing the Bot Ransomware.

Another Kind of Trojan 'Bot'

Although a Trojan botnet is an archetypal category of Trojan networks that leverages decentralization infected computers for attacks such as DDoSing Web servers, a threat actor is putting the 'bot' term to different usage. The Bot Ransomware is a file-locking Trojan that's a basic variant of the Dharma Ransomware, a Ransomware-as-a-Service family that's well-known for numerous and extortionist campaigns. Its e-mail choice also is somewhat unique and helps distinguish the Trojan from the hundreds of relatives vying for many of the same victims.

The Bot Ransomware's operating procedure isn't, however, much more creative than that of similar Trojans like the Xda Ransomware, the Uta Ransomware, the Q1G Ransomware or the BSC Ransomware. It uses a secured encryption routine as the primary attack and method of locking files, with which it turns the user's documents, pictures, and other media into imprisoned data. Users can isolate them by searching for the 'bot' extensions, along with the ID serials and bracketed e-mails, that the Trojan implants into the names.

Besides the bot theme, the Bot Ransomware also drops a TXT and HTA ransom message that uses a preexisting Dharma Ransomware template. Astute readers might note that the Bot Ransomware's preference of e-mail address uses the name of a German security company. While malware experts find no clear connections between the threat actor and the Sectex company, criminals, sometimes, 'collect' the brand names of cyber-security researchers and corporations out of mockery.

The Mixed Geographical History of the Bot Ransomware

Ransomware-as-a-Services are often, but not always, more streamlined and uncomplicated affairs than the more unpredictable, independent equivalents. However, in the Bot Ransomware's case, malware researchers are hesitant at assigning a geolocational distribution to its campaign. While the e-mail suggests characteristics with German cyber-security, some of Bot Ransomware's samples use internal Chinese language codes. Moreover, all of the Bot Ransomware's ransom notes are in English, in keeping with the Dharma Ransomware's norms.

On the other hand, all users should be abiding by the practices most likely of thwarting this Trojan, even if they live in locations as different as China and Germany. Turning off Remote Desktop features, using strong passwords for securing logins, and scanning downloads (including unrequested e-mail attachments and torrents, especially) are generally-helpful defenses. A backup schedule also can provide a much safer and cheaper file restoration possibility than paying any trojan's ransom.

Just under half of most AV brands are identifying this threat currently. Updating your anti-malware solutions will heighten their rates for detecting newly-found trojans and can help with removing the Bot Ransomware or stopping infections outright.

The Bot Ransomware is much more narrow than a zombie botnet, but that doesn't make it harmless. For the individuals struggling against it, losing their files is, probably, even worse than having their computers directed to attacking others.

Related Posts

Loading...