Story image

Bitdefender creates decryption tool for Bart ransomware victims

09 May 2017

Help is at hand for victims of the Bart ransomware, after Bitdefender released a decryption tool that works for all variants.

The Bart ransomware is able to encrypt files without an internet connection - but it does need a connection to communicate with the Command & Control (C&C) server to transfer bitcoins and deliver the decryption key.

The free Bart Ransomware Decryption tool, a collaboration between Bitdefender, Europol and Romanian Police, can help victims recover from all variants of the Bart ransomware.

The Bart ransomware has been creating havoc since July 2016 when it was discovered in spam with the subject line of ‘photos’. The email contained an attachment with malicious JavaScript. 

The Bart ransomware is able to delete system restore points, generate a seed to form encryption keys using information from the victim’s device, uses a master key to encrypt the key used to encrypt the files, and then displays a ransom note.

It demands a $2000 ransom from victims and then redirects to a .onion website.

The free decryptor is able to decrypt files with the bart.zip, .bart and .perl extensions. It is free to download from the “No More Ransomware” website.

Bitdefender says that almost half of ransomware victims pay fees ranging from $300 to $500. Ransomware-on-demand and ransomware-as-a-service have increased the volume and scale of ransomware attacks, Bitdefender says.

According to statistics from a recent Trend Micro report, ransomware attacks skyrocketed 752% last year. 

Both Bitdefender and the FBI strongly advise against paying ransom demands as there is no guarantee a decryption key will be provided. Ransom payments also fund future ransomware attacks.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.