BDDY Ransomware is the latest addition to the colossal Ransomware Clan. It is the brand-new variant of the nasty Matrix Ransomware Family. Cyber-security analysts suspect spam e-mail campaign & OS exploits to be the prime methods of .BDDY File Virus Distribution.
After infecting the system, it restricts the user’s access to system & user files by encrypting them. It instantly renames the encrypted files by appending its malicious .BDDY Extension to file-names. It also drops a ransom-demanding note on the victim’s desktop & all the folders that contain .BDDY Files.
The note contains instructions for the victim to get in touch with hackers & pay them ransom in order to get the encrypted data back. According to the note, paying ransom amount [in Bitcoin(s)] is the only possible way to restore the encrypted data & files.
Hackers demand hefty ransom amount in exchange of the decryption key & BDDY Ransomware Removal tool.
You might wonder if hackers truly exchange decryption key with the victims for the ransom amount! Well, cyber-security analysts suggest users to avoid making any contact with the hackers. The victims not always get the promised decryption key. The cyber-criminals often avoid responding after receiving the ransom amount.
Typically, the only possible way of restoring the encrypted files without paying the ransom is to recover it from a backup. Therefore, computer users are advised to take a periodical backup of the data in order to prevent it from malware attack.
Let us sneak a peek at the threats posed by BDDY Ransomware & possible preventive measures against its attack.
|Symptoms||It infects your system with the motive of encrypting files. The encrypted files are inaccessible. The ransom-demanding note appears on the desktop & folders containing .BDDY Files.|
|Damage||You are unable to open the encrypted files. The malware may increase the malicious payload in your system.|
|Removal||Download Removal Tool|
BDDY Ransomware, the latest member of the Matrix Ransomware Family is currently posing as a great threat to the computer users around the world. It is capable of infecting the Windows-based systems without user’s knowledge/intervention.
Spam E-mail Campaigns & various commonly used internet services are considered to be the main methods of .BDDY File Virus Infection. Once installed on the system, it searches the system for targeted file types & extensions. When found, it employs a highly-complex cryptographic algorithm to encrypt the files.
Some of the file extensions that BDDY Ransomware is capable of encrypting include:
These targeted file extensions are instantly made inaccessible to the users. Files are renamed by appending:
To understand the renaming, let us take an example. A file named 1.jpg might be renamed as [Buddy@criptext.com].xxxxxxxx-xxxxxxxx.BDDY.
Detailed analysis of BUDY Ransomware behavior has revealed that it shares some common traits with other malware such as Horriblemorning, r00t, and Parad1gm.
Once the targeted file extensions are encrypted, BDDY Ransomware drops a ransom-demanding note on victim’s desktop & the folders containing encrypted files.
The ransom note is in text format & named “#BDDY_README#.rtf”. The note suggests the users that decrypting files is not possible without the decryption key & software that are stored on servers managed by the BDDY Developers.
These decryption tools could be accessed only after paying hefty ransom amount to the hackers. The note suggests victims to contact the hackers via e-mail to get the detailed instructions for purchasing the decryption tools.
The hackers e-mail id mentioned in the ransom note are:
The hackers demand ransom to be paid in bitcoins only to avoid getting tracked by cyber-security researchers. They also offer to decrypt 3 encrypted files for absolutely no cost, as a guarantee of decryption. The file should not be larger than 5 MB, as mentioned by hackers.
However, the claims of decryption made by hackers are mere tricks of earning the confidence of the victims. Paying the ransom to hackers doesn’t guarantee decryption of files.
Investigations have found that majority of hackers do not respond the victims after receiving the ransom amount, which ultimately results in financial & data loss of the victims.
Hence, victims are advised to demolish any encouragement to contact the hackers. In addition to that, we advise taking periodical data backup on remote servers & unplugged storage devices.
The cyber-criminals behind BDDY Ransomware use various strategies for malware distribution which include –
BDDY Ransomware removal instructions are still not known at this time. However, here are few common measures that have been concluded after proper research & analysis by our analysts.
To restart the system to Safe Mode with Networking, if already switched ON then follow the below steps:
5 Once the system restarts, click on the username and enter the password (if any) to log in.
If the system restore was enabled for both, system and user files, then you can recover your personal data through Windows Previous Version, provided the ransomware has not damaged the backup files. To restore your data follow the instructions given below –
Continue to follow steps 4 & 5 of Method 2 to restore the System Files and settings.
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
The researchers at Virus Removal Guidelines are dedicated to track down the latest vulnerabilities which may infringe your system security. Our team of expert performs a detailed research about every malware infection before educating our users about the same.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.