Yet another strain of Dharma ransomware has been spotted in the wild. This time threat actors have shifted to the following string of extensions – [Basecrypt@aol.com].BSC. Dharma ransomware is a threat with highly complex code that disrupts system security and encrypts personal files. Unfortunately, following encryption, all valuable files of yours remain out of order until their code is reverted back to its original state. Based on those evil impacts, the ransomware extorts a ransom fee by displaying a ransom message on the screen. According to this message, you will be able to decrypt .BSC files only if you contact hackers for more information on a ransom payment process.
If you are a victim of this ransomware, you should consider the immediate removal of all malicious files from your infected system. Otherwise, it could spread its malicious files across the whole network and infect all devices connected to it.
In this article, you will find more information about [Basecrypt@aol.com].BSC virus as well as a step-by-step guide on how to remove malicious files from the infected system and how to potentially recover files encrypted by this ransomware.
|Short Description||A data locker ransomware designed to plague computer system settings, utilize strong cihper algorithm and encrypt valuable files.|
|Symptoms||Important files are locked and renamed with a string of a few extensions the last of which is .BSC|
Ransom message insists on payment for a files decryption tool.
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by [Basecrypt@aol.com].BSC |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss [Basecrypt@aol.com].BSC.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
[Basecrypt@aol.com].BSC Ransomware Virus (Dharma) – Distribution and Impact
The name of [Basecrypt@aol.com].BSC ransomware virus is a derivative of the two extensions it uses for encrypted files. Initially, the threat is a strain of the infamous Dharma ransomware. The main goal of this ransomware is to blackmail its victims into paying a ransom fee in digital currency to cybercriminals.
In order to complete that goal, [Basecrypt@aol.com].BSC ransomware virus attempts to land unnoticeably on computer systems so it can then disrupt their security and encode personal files by using a strong cipher algorithm.
Currently, samples of this threat are lurking around the web. Guesses are that the spread is realized mainly via malspam campaigns. Malspam enables hackers to deliver malicious code on users’ devices with the help of massive email campaigns. Spam emails which are part of attack campaigns usually contain one or more of the following components:
- A link to compromised web page that is set to download and execute infection files directly on the PC. The URL address to this page may be presented in the form of an in-text link, banner, image, button or full URL address.
- A malicious file attachment that is presented as legitimate document by the text message. It could be uploaded in a .rar or .zip archive. Such a file could be set to evade active security measures and trick you into running the ransomware on your PC.
Once started on a computer system .harma ransomware attempts to evade detection by running specific checks for active security measures. When ready, it initiates a long sequence of malicious operations that affect the settings of some essential system components like the Registry Editor.
By adding malicious entries under the registry keys Run and RunOnce, the ransomware becomes able to misuse their functionalities for obtaining a persistent presence on the infected device. So every next, time you start your PC, Dharma ransomware will load automatically along with all important system startup processes and applications.
In fact, almost all initial attack stages performed by .harma virus support the completion of its main goal which is encryption of personal data. Once it reaches this stage of the attack, the ransomware performs an encryption process by utilizing sophisticated cipher algorithm.
As a result, of this process, it prevents you from accessing the data stored by your valuable files. A distinctive trait of a corrupted file is the long sequence of extensions that appears appended to its name. Below you can see the pattern it follows:
Yet another reason for [Basecrypt@aol.com].BSC ransomware virus to affect the registry key RunOnce is the need to display its ransom message at the end of the attack. It first drops this message on the system and then loads it on the screen in an attempt to blackmail you into paying ransom fee for .BSC files recovery.
Similar to some recently detected Dharma ransomware strains like.beets files virus, .good files virus and .ТОР13 files virus the [Basecrypt@aol.com].BSC ransomware virus variant is likely to present the following ransom message:
Here is a copy of the text of .harma virus’ ransom message:
All FILES ENCRYPTED “RSA1024”
All YOUR FILES HAVE BEEN ENCRYPTED!!! IF YOU WANT TO RESTORE THEM, WRITE US TO THE E-MAIL WSS911@tutanota.com
IN THE LETTER WRITE YOUR ID, YOUR ID ********
IF YOU ARE NOT ANSWERED, WRITE TO EMAIL: WSS911@tutanota.com
YOUR SECRET KEY WILL BE STORED ON A SERVER 7 DAYS, AFTER 7 DAYS IT MAY BE OVERWRITTEN BY OTHER KEYS, DON’T PULL TIME, WAITING YOUR EMAIL
FREE DECRYPTION FOR PROOF
You can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)
When you make sure of decryption possibility transfer the money to our bitcoin wallet. As soon as we receive the money we will send you:
1. Decryption program.
2. Detailed instruction for decryption.
3. And individual keys for decrypting your files.
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Apparently, this message aims to persuade you to contact hackers at a presented email in order to receive more details on the ransom payment process. Beware that they could fool you into paying for a broken decryption tool that cannot recover .BSC files. They could even skip answering you once you transfer them the ransom.
Remove [Basecrypt@aol.com].BSC Ransomware Virus and Attempt to Restore Data
The so-called [Basecrypt@aol.com].BSC virus is a threat with highly complex code designed to corrupt both system settings and valuable data. So the only way to use your infected system in a secure manner again is to remove all malicious files and objects created by the ransomware. For the purpose, you could use our removal guide that reveals how to clean and secure your system step by step. In addition, in the guide, you will find several alternative data recovery approaches that may be helpful in attempting to restore files encrypted by Dharma [Basecrypt@aol.com].BSC ransomware. We remind you to back up all encrypted files to an external drive before the recovery process.