[Basecrypt@aol.com].BSC Ransomware Virus - Remove It
THREAT REMOVAL

[[email protected]].BSC Ransomware Virus – Remove It

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

remove-basecrypt-aol-com-BSC-ransomware-virus-restore-files-sensorstechforum

Yet another strain of Dharma ransomware has been spotted in the wild. This time threat actors have shifted to the following string of extensions – [[email protected]].BSC. Dharma ransomware is a threat with highly complex code that disrupts system security and encrypts personal files. Unfortunately, following encryption, all valuable files of yours remain out of order until their code is reverted back to its original state. Based on those evil impacts, the ransomware extorts a ransom fee by displaying a ransom message on the screen. According to this message, you will be able to decrypt .BSC files only if you contact hackers for more information on a ransom payment process.

If you are a victim of this ransomware, you should consider the immediate removal of all malicious files from your infected system. Otherwise, it could spread its malicious files across the whole network and infect all devices connected to it.

In this article, you will find more information about [[email protected]].BSC virus as well as a step-by-step guide on how to remove malicious files from the infected system and how to potentially recover files encrypted by this ransomware.

Threat Summary

Name[[email protected]].BSC
TypeRansomware, Cryptovirus
Short DescriptionA data locker ransomware designed to plague computer system settings, utilize strong cihper algorithm and encrypt valuable files.
SymptomsImportant files are locked and renamed with a string of a few extensions the last of which is .BSC
Ransom message insists on payment for a files decryption tool.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by [[email protected]].BSC

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss [[email protected]].BSC.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

[[email protected]].BSC Ransomware Virus (Dharma) – Distribution and Impact

The name of [[email protected]].BSC ransomware virus is a derivative of the two extensions it uses for encrypted files. Initially, the threat is a strain of the infamous Dharma ransomware. The main goal of this ransomware is to blackmail its victims into paying a ransom fee in digital currency to cybercriminals.

In order to complete that goal, [[email protected]].BSC ransomware virus attempts to land unnoticeably on computer systems so it can then disrupt their security and encode personal files by using a strong cipher algorithm.

Currently, samples of this threat are lurking around the web. Guesses are that the spread is realized mainly via malspam campaigns. Malspam enables hackers to deliver malicious code on users’ devices with the help of massive email campaigns. Spam emails which are part of attack campaigns usually contain one or more of the following components:

  • A link to compromised web page that is set to download and execute infection files directly on the PC. The URL address to this page may be presented in the form of an in-text link, banner, image, button or full URL address.
  • A malicious file attachment that is presented as legitimate document by the text message. It could be uploaded in a .rar or .zip archive. Such a file could be set to evade active security measures and trick you into running the ransomware on your PC.

Once started on a computer system .harma ransomware attempts to evade detection by running specific checks for active security measures. When ready, it initiates a long sequence of malicious operations that affect the settings of some essential system components like the Registry Editor.

By adding malicious entries under the registry keys Run and RunOnce, the ransomware becomes able to misuse their functionalities for obtaining a persistent presence on the infected device. So every next, time you start your PC, Dharma ransomware will load automatically along with all important system startup processes and applications.

In fact, almost all initial attack stages performed by .harma virus support the completion of its main goal which is encryption of personal data. Once it reaches this stage of the attack, the ransomware performs an encryption process by utilizing sophisticated cipher algorithm.
As a result, of this process, it prevents you from accessing the data stored by your valuable files. A distinctive trait of a corrupted file is the long sequence of extensions that appears appended to its name. Below you can see the pattern it follows:

Yet another reason for [[email protected]].BSC ransomware virus to affect the registry key RunOnce is the need to display its ransom message at the end of the attack. It first drops this message on the system and then loads it on the screen in an attempt to blackmail you into paying ransom fee for .BSC files recovery.

Similar to some recently detected Dharma ransomware strains like

What is .beets files virus? What is Dharma ransomware? Can files encrypted by .beets files virus be recovered? How to remove it?
.beets files virus,
What is .good files virus? What is Dharma ransomware? Can files encrypted by .good files virus be recovered? How to remove it?
.good files virus and
This is a step-by-step removal guide for .TOR13 files virus (Dharma ransomware).What is .TOR13 ransomware? How to remove .TOR13 ransomware?
.ТОР13 files virus the [[email protected]].BSC ransomware virus variant is likely to present the following ransom message:

stf-basecrypt-aol-com-bsc-ransomware-virus-dharma-ransom-note

Here is a copy of the text of .harma virus’ ransom message:

All FILES ENCRYPTED “RSA1024”
All YOUR FILES HAVE BEEN ENCRYPTED!!! IF YOU WANT TO RESTORE THEM, WRITE US TO THE E-MAIL [email protected]
IN THE LETTER WRITE YOUR ID, YOUR ID ********
IF YOU ARE NOT ANSWERED, WRITE TO EMAIL: [email protected]
YOUR SECRET KEY WILL BE STORED ON A SERVER 7 DAYS, AFTER 7 DAYS IT MAY BE OVERWRITTEN BY OTHER KEYS, DON’T PULL TIME, WAITING YOUR EMAIL
FREE DECRYPTION FOR PROOF
You can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)
DECRYPTION PROCESS:
When you make sure of decryption possibility transfer the money to our bitcoin wallet. As soon as we receive the money we will send you:
1. Decryption program.
2. Detailed instruction for decryption.
3. And individual keys for decrypting your files.
!WARNING!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Apparently, this message aims to persuade you to contact hackers at a presented email in order to receive more details on the ransom payment process. Beware that they could fool you into paying for a broken decryption tool that cannot recover .BSC files. They could even skip answering you once you transfer them the ransom.

Remove [[email protected]].BSC Ransomware Virus and Attempt to Restore Data

The so-called [[email protected]].BSC virus is a threat with highly complex code designed to corrupt both system settings and valuable data. So the only way to use your infected system in a secure manner again is to remove all malicious files and objects created by the ransomware. For the purpose, you could use our removal guide that reveals how to clean and secure your system step by step. In addition, in the guide, you will find several alternative data recovery approaches that may be helpful in attempting to restore files encrypted by Dharma [[email protected]].BSC ransomware. We remind you to back up all encrypted files to an external drive before the recovery process.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...