BDDY Ransomware
Ransomware | 01/07/2020

How to remove BDDY Ransomware from your system?

About: BDDY Ransomware, the brand-new Matrix File Virus Variant is posing threat to computer user. It encrypts files & makes them inaccessible. Read our comprehensive guide to learn how to restore encrypted data & prevent its attack.

| Ransomware | How to remove BDDY Ransomware from your system?

Guide to Remove BDDY Ransomware –

BDDY Ransomware is the latest addition to the colossal Ransomware Clan. It is the brand-new variant of the nasty Matrix Ransomware Family. Cyber-security analysts suspect spam e-mail campaign & OS exploits to be the prime methods of .BDDY File Virus Distribution.

Threat Summary- BDDY Ransomware

After infecting the system, it restricts the user’s access to system & user files by encrypting them. It instantly renames the encrypted files by appending its malicious .BDDY Extension to file-names. It also drops a ransom-demanding note on the victim’s desktop & all the folders that contain .BDDY Files.

The note contains instructions for the victim to get in touch with hackers & pay them ransom in order to get the encrypted data back. According to the note, paying ransom amount [in Bitcoin(s)] is the only possible way to restore the encrypted data & files.

Claims of Hackers: True or False?

Hackers demand hefty ransom amount in exchange of the decryption key & BDDY Ransomware Removal tool.

You might wonder if hackers truly exchange decryption key with the victims for the ransom amount! Well, cyber-security analysts suggest users to avoid making any contact with the hackers. The victims not always get the promised decryption key. The cyber-criminals often avoid responding after receiving the ransom amount.

Typically, the only possible way of restoring the encrypted files without paying the ransom is to recover it from a backup. Therefore, computer users are advised to take a periodical backup of the data in order to prevent it from malware attack.

Let us sneak a peek at the threats posed by BDDY Ransomware & possible preventive measures against its attack.

Threat Summary of BDDY Ransomware

Threat Summary
Name BDDY
Type Ransomware
Category Malware
Targeted OS Windows
Symptoms It infects your system with the motive of encrypting files. The encrypted files are inaccessible. The ransom-demanding note appears on the desktop & folders containing .BDDY Files.
Damage You are unable to open the encrypted files.  The malware may increase the malicious payload in your system.
Removal Download Removal Tool

Threat Behavior of BDDY Ransomware

BDDY Ransomware, the latest member of the Matrix Ransomware Family is currently posing as a great threat to the computer users around the world. It is capable of infecting the Windows-based systems without user’s knowledge/intervention.

Spam E-mail Campaigns & various commonly used internet services are considered to be the main methods of .BDDY File Virus Infection. Once installed on the system, it searches the system for targeted file types & extensions. When found, it employs a highly-complex cryptographic algorithm to encrypt the files.

Targeted Files - BDDY Ransomware

Some of the file extensions that BDDY Ransomware is capable of encrypting include:

  • Images (.jpg, .jpeg, .raw, .tif, .gif, .png)
  • Audio Files (.mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4)
  • Video Files (.3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob)
  • Document files (.docx, .doc, .odt, .rtf, .text, .pdf, .htm, .ppt)
  • Backup Files (.bck, .bckp, .tmp, .gho)

These targeted file extensions are instantly made inaccessible to the users. Files are renamed by appending:

  • The developer’s e-mail address
  • Two random strings
  • .BDDY Extension to the file names

To understand the renaming, let us take an example. A file named 1.jpg might be renamed as [Buddy@criptext.com].xxxxxxxx-xxxxxxxx.BDDY.

Detailed analysis of BUDY Ransomware behavior has revealed that it shares some common traits with other malware such as Horriblemorning, r00t, and Parad1gm.

BDDY Ransom Note & Other Details

Once the targeted file extensions are encrypted, BDDY Ransomware drops a ransom-demanding note on victim’s desktop & the folders containing encrypted files.

The ransom note is in text format & named “#BDDY_README#.rtf”. The note suggests the users that decrypting files is not possible without the decryption key & software that are stored on servers managed by the BDDY Developers.

These decryption tools could be accessed only after paying hefty ransom amount to the hackers. The note suggests victims to contact the hackers via e-mail to get the detailed instructions for purchasing the decryption tools.

The hackers e-mail id mentioned in the ransom note are:

  • buddy@criptext.com
  • buddy888@protonmail.com
  • buddy888@tutanota.com

The hackers demand ransom to be paid in bitcoins only to avoid getting tracked by cyber-security researchers. They also offer to decrypt 3 encrypted files for absolutely no cost, as a guarantee of decryption. The file should not be larger than 5 MB, as mentioned by hackers.

Ransom Note - BDDY

However, the claims of decryption made by hackers are mere tricks of earning the confidence of the victims. Paying the ransom to hackers doesn’t guarantee decryption of files.

Investigations have found that majority of hackers do not respond the victims after receiving the ransom amount, which ultimately results in financial & data loss of the victims.

Hence, victims are advised to demolish any encouragement to contact the hackers. In addition to that, we advise taking periodical data backup on remote servers & unplugged storage devices.

Distribution Techniques of BDDY Ransomware

The cyber-criminals behind BDDY Ransomware use various strategies for malware distribution which include –

  1. Software Bundling: Software bundling is the process in which a malicious program is distributed with other free software, to get an unnoticed entry into your computer system. When a user installs a free application, the malicious programs gains a front door entry with the free application, the user has downloaded. Thus, it is a good idea to keep an eye on the installation screens while installing these free applications.
  2. Infected Storage Devices: Your system can also get infected by using removable media such as USB hard drives and jump drives without scanning them with an anti-virus.
  3. Spam Emails – Spamming is the most economic and common method used for the distribution of such malware. The targeted users get genuine looking emails which contain .doc, .txt, and other similar attachments. These attachments can be named as anything which can grab the user’s attention and triggers him/her to open the attachment. As soon as the user opens this attachment, the malware infects the user’s computer system.
  4. Malicious Websites or Malevolent Advertisements: The malicious websites are the ones which are created just for promoting the malware infections. Such websites include but are not limited to porn sites, torrent sites and other free downloading platforms. By visiting such websites, the adware infects the user’s computer without permission. Fake advertisements and updates like Flash player and windows updates which ask the user to update to the latest version are a few examples. When the users click on such links, their computer system gets infected. That is why, it is highly recommended to resist clicking on such links. Also avoid clicking on advertisements offering free stuff such as Win an iPhones, cars or free overseas trips etc.

Download Vipre Malware Remover

How to remove BDDY Ransomware infection from the system-

BDDY Ransomware removal instructions are still not known at this time. However, here are few common measures that have been concluded after proper research & analysis by our analysts.

STEP A: Reboot your system to Safe Mode

To restart the system to Safe Mode with Networking,  if already switched ON then follow the below steps:

Windows 7/ Vista/ XP

  1. Click on Windows icon present in the lower left corner of the computer screen.
  2. Select and click  Restart.
  3. When the screen goes blank, Keep tapping  F8  Key until you see the Advanced Boot Options window.
  4. With the help of arrow keys on keyboard, Select Safe Mode with Networking  option from the list and press the Enter Key. The system will then restart to Safe Mode with Networking.

5 Once the system restarts, click on the username and enter the password (if any) to log in.

Windows 10 / Windows 8

  1. Press and hold the Shift Key and simultaneously click on the windows icon present in the lower left corner of your computer screen.
  2. While the Shift key is still pressed click on the Power button and then click on Restart.
  3. Now select Troubleshoot → Advanced options → Startup Settings.
  4. When the Startup Settings screen appears which is the first screen to appear after restart, select and click on Enable Safe Mode with Networking. The system will then restart to Safe Mode with Networking.
  5. Once the system restarts in Safe Mode, click on the username and enter the password, if any to log in.

STEP B: Delete the suspicious key from the Configuration Settings

  1. Type “Msconfig” in search box / Run Box, select it and press Enter.
  2. Click on “Services” Tab and click on “Hide all Microsoft services”.
  3. Select BDDY Ransomware from the list of remaining services and disable it by removing the tick mark from the checkbox and click on Apply button.

Windows 7

  1. Click on the next tab – “Startup”.
  2. Find any blank or suspicious entry or the entry with BDDY Ransomware mentioned and remove the check mark.
  3. Click on Apply button and then click on OK.

Windows 10

  1. Click on the next tab – “Startup”.
  2. Take the mouse cursor to ‘Open task Manager‘ link and click on it.  This opens the Task Manager window.
  3. Find any blank or suspicious entry or the entry with BDDY Ransomware mentioned and click on it.
  4. Then click on Disable button.

STEP C: Restore the Encrypted Data via windows previous version

If the system restore was enabled for both, system and user files, then you can recover your personal data through Windows Previous Version, provided the ransomware has not damaged the backup files. To restore your data follow the instructions given below –

  1. Open My Computer and search for the folder you want to restore.
  2. As soon as you find it, right click on it and choose the restore previous version option from the new window.restore windows previous version
  3. This option will display all the previous copies of the folder.restore windows previous version
  4. Now select restore data and through the options i.e. Open – Copy – Restore. 

STEP D: Restore the System Files & Settings

From Control Panel

  1. Click on the ‘Start’ button on the taskbar. This will open the Start menu.
  2. Click on the ‘Control Panel’ button in the Start menu. This will open the control panel window.Step 2-Windows 7 Control Panel
  3. In the Control Panel window, click on the ‘View by:’ button on the top right. Select the Large Icon optionStep 3 - Windows 7 Control Panel
  4. In the control Panel window click on the ‘Recovery Icon’. This will open a window that will ask ‘Restore the computer to an earlier point in time’.Step 4- Windows 7 Control Panel
  5. Click on the ‘Open system restore’ button. This will open the ‘system restore ’window where you need to click on the Next Button.Step 5- Windows 7 Control Panel
  6.  Select the restore point that is prior the infiltration of BDDY Ransomware. After doing that, click Next.Step 6- Windows 7 Control Panel
  7. This will open the ‘Confirm your restore point’ dialog box. Click on Finish button. This will restore your system to a previous restore point before your system was infected by BDDY Ransomware.Step 7-Windows 7 Control Panel

OR

From Command Prompt

  1. Type cmd in the search box and click on the command prompt to open the Command Prompt window. box and clicking on it.
  2. Once the Command Prompt window shows up, enter cd restore and click Enter.(Ensure that you in the system32 directory of Windows folder in C Drive)
  3. Now type rstrui and press Enter again.
  4. When a new window shows up, click Next and select your restore point that is prior the infiltration of BDDY Ransomware. After doing that, click Next.Step 4- Windows 7 Command PromptStep 4 b- Windows 7 Command Prompt
  5. This will open the ‘Confirm your restore point’ dialog box. Click on Finish button. This will restore your system to a previous restore point before your system was infected by BDDY Ransomware.Step 7-Windows 7 Control Panel

OR

Method 3 : Directly type 'rstrui' in the search box

  1. Type ‘Rstrui’ in the search box present on the task bar. This will open the System restore dialog box.

Continue to follow steps 4 & 5 of Method 2 to restore the System Files and settings.

How to prevent BDDY Ransomware from infecting your system-

  1. Keeping the Operating System Updated- In order to remain protected and avoid such infections, it is recommended to keep your Operating System updated by enabling the automatic update on your system. The systems with outdated or older versions of Operating System become an easy target for the attackers.
  2. Resist clicking on spam emails – One of the major techniques used for malware distribution is forwarding spam emails to the user. The system gets infected as soon as the user clicks on the attachment. These mails appear to be genuine, so be aware and resist falling for these tricks.
  3. Keep an eye on third party installations- It is quite important that you take due care while installing any third party applications for they are major source of such infections. Such malware programs come bundled with the free applications thereby requiring the user to remain cautious.
  4. Regular periodical backup- In order to keep your data and files safe, it is recommended to take regular back up of all your data and files either on an external drive or cloud.
  5. Use Anti-Virus Protection- We strongly recommend the use of antivirus protection/internet security in your PC like Vipre and BULL GUARD so that it remains safe.
  6. Enable the Ad Blocker/Popup Blocker in your browser- Enabling the popup blocker/ ad blocker in your chosen browser will help you to stay protected from annoying adware.

Hits: 134

Leave a Reply

Your email address will not be published. Required fields are marked *

Did you find the article informative? Yes NO

Get Regular Updates Related to All the Threats

Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.

Virus Removal Guidelines
Plot No 319, Nandpuri- B Pratap Nagar
Jaipur
Rajasthan 302033
Phone: +91 9799661866