SolidBit ransomware has recently emerged, targeting extort large and small businesses, the group behind SolidBit ransomware has been triggering attacks via email campaigns with malicious links and attachments.
From the moment the environment is accessed, the attackers begin to encrypt files considered important and make them inaccessible to the user.
Malware can also be transferred from one computer to another through the internet. If an infected device is connected to a network, the virus can spread to other devices on the same network.
SolidBit adds a random sequence of four characters to the original file name as a trail after its passage.
According to the group’s own website, the encryption used is a mixture of the AES and RSA algorithms.
In addition to the extension used on the infected files, the ransomware also generates two ransom notes on the attacked machine. One of them will be displayed as a pop-up and the other as a text file “RESTORE-MY-FILES.txt.”
The victim will find some information there, such as the name of the group responsible for the attack and the path to follow to contact them via the Tor browser and pay the ransom in cryptocurrencies.
Some groups have started to stand out with a slightly different approach to the ransom note and this is also the case with the SolidBit ransomware. The group’s proposal is to decrypt an infected file of less than 1 MB for free as a guarantee in the face of the situation.
However, we know that there is no guarantee when it comes to criminals. Double extortion can end up becoming an option for those responsible for the attack.
Therefore, one should not negotiate with criminals.
Digital Recovery is a company specialising in the recovery of files that have been partially or completely encrypted by SolidBit ransomware, we can perform recovery without the need for the decryption key.
We can recover virtually all types of storage devices including HD, SSD, RAID systems, databases, virtual machines and servers.
We have a team of experts available 24/7 with the knowledge and tools needed to take action to recover encrypted data.
Our solutions are highly efficient and based on the General Data Protection Regulation (GDPR) and our confidentiality agreement to maintain the necessary secrecy in our projects.
We are here to help you, contact our experts right now.
Learn more about data recovery and technology innovations.