Search Results

  • bad

    Technical Breakdown – Ransomware tagged “BAD” 1. File Extension & Renaming Patterns Confirmation of File Extension: The canonical mark left on encrypted data is the suffix “.BAD” (all lowercase in most sightings, occasionally seen in upper-case “.BAD” or with a single leading dot .BAD). Renaming Convention: Original name: Quarterly_Report_Q3.xlsx After encryption: Quarterly_Report_Q3.xlsx.BAD If multiple layers…

  • backups

    Excerpt from “Ransomware-to-Date, 7ᵗʰ Ed.” Analyst note on the BACKUPS variant (file-extension backups) Technical Breakdown 1. File Extension & Renaming Patterns Exact extension confirmed: “.backups” (lowercase, plural). Typical renaming template: <original_filename>.<original_extension>.<ID><e-mail1><e-mail2>.backups Example: Presentation.pptx.id-7C3BA1F1.[[email protected]][[email protected]].backups Victims often first realize infection when the extra “.backups” suffix suddenly appears on every document. 2. Detection & Outbreak Timeline • First…

  • backupdecoder

    Comprehensive Guide to the “backupdecoder” Ransomware Variant 1. Technical Breakdown 1.1 File Extension & Renaming Patterns Confirmed extension: .backupdecoder Renaming Convention: Original filename → <original_name>.<original_ext>.backupdecoder. If the file already had a multi-dot suffix (e.g., report.final.xlsx), the ransomware still appends “.backupdecoder” at the very end, giving: report.final.xlsx.backupdecoder. Inside each folder that contains encrypted files, the malware…

  • backup

    Technical Breakdown: .backup – Ransomware masquerading as a friendly extension 1. File Extension & Renaming Patterns Confirmation of File Extension: The malware appends the literal suffix .backup to each encrypted file (example: Annual_Report.xlsx.backup). Renaming Convention: • Original filename and its innermost subfolder structure remain intact. • Only the additional .backup string is appended; no e-mail…

  • backoff

    Technical Breakdown: Backoff Ransomware 1. File Extension & Renaming Patterns Confirmation of File Extension: The Backoff ransomware family (Backoff) itself does NOT append a new file-extension like .backoff. Instead, it manifests as point-of-sale (POS) malware whose primary goal is credential-theft and RAM-scraping, not file encryption. Renaming Convention: Because Backoff is not crypto-ransomware, files remain unchanged…

  • backmydata

    ALL SECTIONS BELOW ARE SPECIFICALLY ABOUT THE “BACKMYDATA” RANSOMWARE STRAIN (commonly tagged with the extension & variant names: .backMyData, .BackMyData, .BACKMYDATA, and the original Phobos suffixes such as id[….].[[attacker_email]].backMyData) Technical Breakdown 1. File Extension & Renaming Patterns • Confirmation of File Extension: .backmydata (case-insensitive but usually mixed-case on Windows, e.g., presentation.docx.BackMyData). • Renaming Convention: Original…

  • backlock

    Comprehensive Ransomware Resource – “Backlock” (.backlock) Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: Each encrypted file receives the fixed secondary suffix .backlock. Renaming Convention: original_name.ext → original_name.ext.backlock Example: Quarterly_Report.xlsx becomes Quarterly_Report.xlsx.backlock. 2. Detection & Outbreak Timeline Approximate Start Date/Period: First large-scale detections surfaced on 25 February 2024 and peaked through…

  • backjohn

    backjohn Ransomware Resource Guide Last review: 2024-06-10 Technical Break-down 1 File Extension & Renaming Patterns • Extension: .backjohn (lowercase, appended after any original extension so Contract.pdf → Contract.pdf.backjohn) • Renaming routine: Generates pseudo-unique MetroHash64 of original file name → rewrites file header → AES-256-CBC encrypts file body → appends .backjohn Leaves an all-lowercase rename inside…

  • back

    Technical Breakdown – ransomware that appends the extension “.back” 1. File Extension & Renaming Patterns Confirmation of File Extension: .back Every successfully encrypted file is literally suffixed with literal string .back (e.g., Invoice_March_2024.xlsx.back, Database.bak.back). Renaming Convention: The malware keeps the original file name and extension intact entirely, then appends the extra .back to the very…

  • babyk

    Below is a single-source, defense-oriented reference sheet for the ransomware tracked internally as BABYK, based on the .babyk extension it appends to every encrypted file. Technical Breakdown 1. File Extension & Renaming Patterns Confirmation of File Extension: .babyk (all lower-case, no preceding dot on bare filenames; appended after the original extension – e.g., report.xlsx.babyk). Renaming…