Buddyransome Ransomware Encrypts Most File Types

ransomware

Buddyransome is a ransomware that encrypts data and adds the ".buddyransome" extension to file names. For example, if a file was previously named "1.jpg", it will now be called "1.jpg.buddyransome". Furthermore, upon infection, this malicious software drops a text file called "HOW_TO_RECOVERY_FILES.txt" that includes instructions for victims to follow in order to decrypt their files and prevent them from being disclosed.

The ransom note delivered by Buddyransome states that all victim's data has been encrypted, and instructs them to email the given address (buddyransome@aol.com) to receive details on how to obtain the decryption tool. To make sure that the correct person is contacted, a personal ID has been provided in the note.

In summary, Buddyransome is ransomware which encrypts files and appends ".buddyransome" to their names. It also provides instructions for victims to contact the attackers and receive details on how to decrypt their data, in exchange for some sort of payment. A personal ID is also included in the ransom note as an identification measure.

The Buddyransome full note text

The complete text contained inside the "HOW_TO_RECOVERY_FILES.txt" ransom note reads as follows:

Hello!

Your company has been hacked!

All your files are encrypted, but we understand that you can most likely recover from backups.

We have also dumped all of your documents relating to accounting, administration, legal, HR, SQL, passwords and more!

If we don't come to an agreement, we will be forced to hand over all your files to the media for publicity.

Your personal ID: (long alphanumeric string)

If you want to decrypt your files and prevent them from leaking, write to us : buddyransome@aol.com

Please provide your personal ID in the email

What are the common file types and extensions that malware similar to the Buddyransome ransomware encrypts?

Buddyransome ransomware is a type of malicious software that encrypts files on a computer, making them inaccessible until a ransom is paid. It typically targets documents, images, videos, and other types of files. Common file types and extensions that malware similar to Buddyransome ransomware encrypts include: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pdf, .jpg, .jpeg, .png, .gif, .bmp, and more. Additionally it may also target databases such as Microsoft Access (.mdb) and SQL Server (.mdf). Other common file types targeted by this type of malware are archives such as ZIP or RAR files.

How can you protect yoru data from ransomware infections similar to the Buddyransome ransomware?

The best way to protect your data from ransomware infections similar to the Buddyransome ransomware is to practice good cyber security habits. This includes regularly backing up your data, using strong passwords, and keeping your operating system and software up-to-date. Additionally, you should avoid clicking on suspicious links or downloading files from untrusted sources. It is also important to use antivirus software that can detect and block malicious programs such as ransomware. Finally, if you suspect that your computer has been infected with ransomware, it is important to disconnect it from the internet immediately and contact a professional for help.

January 25, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.