Home Malware Programs Ransomware '.Bear File Extension' Ransomware

'.Bear File Extension' Ransomware

Posted: November 16, 2018

The '.Bear File Extension' Ransomware is an update of the Dharma Ransomware, which is a sub-division of the larger Crysis Ransomware family. These file-locking Trojans can encrypt your files to stop their opening, display ransoming messages in several formats, and remove your default backups. Although there is no free decryptor for this threat, you can preserve your files with non-local backups while having anti-malware products isolate or delete the '.Bear File Extension' Ransomware for your PC's protection.

A Trojan that Thinks It's Smarter than You

A file-locking Trojan from the Dharma Ransomware fork of the Crysis Ransomware is pretending that it's software for smart cards, with intentions of compromising Windows PCs for ransoming purposes. Although the '.Bear File Extension' Ransomware's disguise is, more likely than not, separate from its initial infection techniques and infiltration mechanisms, it does help with the threat's system persistence with some plausible deniability. The rest of the '.Bear File Extension' Ransomware's payload demonstrates that it's another, barely-changed variant of this Ransomware-as-a-Service business.

The first stage of the '.Bear File Extension' Ransomware's installer is a fake DLL file that uses Microsoft-referencing credentials, although it doesn't have a corresponding digital signature. It unpacks itself into an executable with less obfuscation against the threat-detecting rules in broad use in the anti-malware industry, and uses secure encryption standards for blocking your media files, similarly to the '.bip File Extension' Ransomware, the 'blacklist@clock.li' Ransomware, the 'getdataback@fros.cc' Ransomware or the 'syndicateXXX@aol.com' Ransomware.

Infection symptoms that malware researchers also confirm as remaining present include:

  • The '.Bear File Extension' Ransomware is capable of wiping default backup data, such as the Windows Shadow Volume Copies.
  • The Trojan creates two ransom notes for the victim: one Notepad TXT file and one HTA (or advanced HTML) pop-up. Both of them provide e-mail addresses for negotiating with the threat actor, who demands Bitcoins for his data-unlocking service.
  • The '.Bear File Extension' Ransomware adds both the extension from its name and an ID to the filenames of the content that it locks. Victims should note that the name changes don't correlate with the encryption that keeps the files from opening in the appropriate programs.

Outsmarting the Smart Card Trojan

As with the other versions of the Crysis Ransomware RaaS, the '.Bear File Extension' Ransomware may be deploying itself with the help of Remote Desktop vulnerabilities, brute-force attacks, or e-mail. Spam e-mails may disguise an attachment, such as a Word or PDF document, for triggering exploits that compromise the PC. Adequate network password protection also is integral to blocking the usual infection vectors for this family and admins should monitor their port and RDP settings for issues.

Because of its removing backups and lacking a public decryption resource, the '.Bear File Extension' Ransomware may block any documents and similar media on the PC permanently. Users should refrain from transferring Bitcoins for a black market decryptor, as long as they have any other options, since the threat actor may take the money without giving the decryption solution. Anti-malware tools are deleting the '.Bear File Extension' Ransomware safely at high-rates, although the industry-wide statistics on detecting the first-stage DLLs are less optimal.

The Ransomware-as-a-Service sector benefits from lazy network security and storage practices. As long as users don't protect their work, malware experts will continue catching updates like the '.Bear File Extension' Ransomware from around the world.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to '.Bear File Extension' Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.