BitPaymer is a ransomware type cyber threat that typically targets Windows-based systems on a compromised network. Also known as “wp_encrypt,” it was first discovered in 2017 and has launched different versions since then.

What Are The Attack Vectors of BitPaymer Ransomware?

BitPaymer uses multiple attack vectors to infiltrate the target network or system. The most commonly used attack vectors are:

  1. Phishing emails targeting organization’s employees
  2. Software downloads via third party, fake or malicious links
  3. Brute force attacks

What Does BitPaymer Ransomware Do?

BitPaymer Ransomware uses multiple steps to spread laterally across a network & infect multiple systems. Let us understand how the ransomware works:

  1. After infecting a system, the ransomware conceals itself & stays in the victim system to gather information such as login credentials, shared drives, IP addresses, private network details, etc.
  2. It further scans for servers running Microsoft Exchange & Microsoft SQL.
  3. The malware then penetrates Active Directory running on the network for lateral movement by infecting all other systems connected to the network.
  4. Once the systems are infected, the ransomware now encrypts all the files on the victim systems using RC4 and RSA-1024 encryption algorithms.
  5. The encrypted files are saved using “.locked” file extension. Some new versions of the BitPaymer ransomware use “.LOCK” as the file extension.
  6. A text file is generated for every encrypted file with extension “readme_txt” to inform the victim of encryption and provide details to contact the hacker.
  7. The ransomware also deletes the recovery checkpoints from the Windows system.
  8. A personalized ransomware note is also left on the desktop which includes ransom fee and steps that should be taken for data recovery.

What Makes BitPaymer Ransomware Unique?

BitPaymer Ransomware differs from other ransomware in many ways:

  1. The ransomware is very well-coded as compared to majority of ransomware that use Ransomware-As-A-Service codes.
  2. The hackers manually attack the Active Directory running on the network & also spend time to know the victim thoroughly.
  3. In some strains of the ransomware, the hackers build custom binary for every victim and even use the victim organization’s name in encrypted file extension.
  4. The ransomware makes extensive efforts to stay concealed in the target system.

How To Stay Protected Against BitPaymer Ransomware?

  1. Educate employees by conducting cyber security workshops to make them capable of spotting phishing attacks.
  2. Ensure regular data backup at multiple locations.
  3. Thoroughly review all RDP connections & secure them.
  4. Make sure to download & install the latest security updates on all servers & systems.

To know more about cyber security solutions for businesses, contact Centex Technologies. You can contact Centex Technologies at Killeen (254) 213 – 4740, Dallas (972) 375 – 9654, Atlanta (404) 994 – 5074, and Austin (512) 956 – 5454.