sb-as logo
Story image

Bitdefender creates decryption tool for Bart ransomware victims

09 May 2017

Help is at hand for victims of the Bart ransomware, after Bitdefender released a decryption tool that works for all variants.

The Bart ransomware is able to encrypt files without an internet connection - but it does need a connection to communicate with the Command & Control (C&C) server to transfer bitcoins and deliver the decryption key.

The free Bart Ransomware Decryption tool, a collaboration between Bitdefender, Europol and Romanian Police, can help victims recover from all variants of the Bart ransomware.

The Bart ransomware has been creating havoc since July 2016 when it was discovered in spam with the subject line of ‘photos’. The email contained an attachment with malicious JavaScript. 

The Bart ransomware is able to delete system restore points, generate a seed to form encryption keys using information from the victim’s device, uses a master key to encrypt the key used to encrypt the files, and then displays a ransom note.

It demands a $2000 ransom from victims and then redirects to a .onion website.

The free decryptor is able to decrypt files with the bart.zip, .bart and .perl extensions. It is free to download from the “No More Ransomware” website.

Bitdefender says that almost half of ransomware victims pay fees ranging from $300 to $500. Ransomware-on-demand and ransomware-as-a-service have increased the volume and scale of ransomware attacks, Bitdefender says.

According to statistics from a recent Trend Micro report, ransomware attacks skyrocketed 752% last year. 

Both Bitdefender and the FBI strongly advise against paying ransom demands as there is no guarantee a decryption key will be provided. Ransom payments also fund future ransomware attacks.

Story image
Radware launches DDoS protection for online gaming
“Online games are a massive, multi-billion-dollar industry, but they frequently fall victim to powerful and targeted DDoS attacks,"More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
BlackBerry partners with ServiceNow for incident response management
BlackBerry has announced it has entered into a partnership with ServiceNow to integrate the BlackBerry AtHoc service within the Now platform for rapid crisis communications and IT service management. More
Story image
Attack from DOS: In Zero We Trust
In combination with malware, DDoS attacks on banks have been used to cause distraction so the transfer of stolen funds goes unnoticed. More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More