Boop ransomware is file-encrypting malware from the Djvu ransomware family, a notorious cyber gang that has already released hundreds of versions of its ransomware.
Boop ransomware encrypts files, adds the .boop file extension to affected files, drops a _readme.txt ransom note, and demands victims pay $980 to decrypt files. This version is practically identical to many others from the Djvu ransomware family, including Nile, Vari, Oonn, Erif, and Kook ransomware.
Boop ransomware is dangerous because once it encrypts files, recovering them is not always possible. The cyber crooks behind this ransomware will offer victims a decryption tool for almost $1000. While paying the ransom may seem like the best option when there are no other alternatives, it’s actually not a great idea. First of all, there are no guarantees that the people behind the ransomware will actually send the decryption tool. Even if they do send one, it will not necessarily work. Countless users in the past have been lost their money and not recovered their files. Second, victims end up supporting future criminal activities by paying, as well as making ransomware a profitable business, encouraging cyber crooks to continue.
If victims have backup of files, they can start recovering files as soon as they remove Boop ransomware. However, it is very important that ransomware is no longer present on the computer when users connect to their backup. Otherwise, backed up files may become encrypted as well.
Many previous versions of Djvu ransomware have a free decryption tool released by malware researchers. However, it does not work on newer versions.
Is it possible to decrypt Boop ransomware files
As soon as the ransomware is initiated, it will start targeting certain files and encrypting them. It mainly encrypts personal files, such as photos, videos, documents, etc., as they’re worth the most to users. All affected files will have .boop added to them (e.g. image.jpg -> image.jpg.boop), and users will not be able to open them. A ransom note _readme.txt would also be dropped once the encryption process is complete. The note is completely identical to the one dropped by all other versions from Djvu. It first explains that files have been encrypted and then offers to decrypt them if victims pay the ransom. The regular price for the decryptor is $980 but a 50% discount would be applied to victims who contact these cyber criminals within 72 hours of infection.
Here’s the ransom note:
Don’t worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.
To get this software you need write on our e-mail:
Reserve e-mail address to contact us:
Your personal ID:
Whether the price is $980 or $490, paying the ransom is not a good idea because of the above mentioned reasons. Mainly because there is no way of knowing whether victims will actually get their files back. The only sure way to recover files is via backup.
Situations like this are why regularly backing up files is so important. There are many different backup options available, and users should be able to find the most convenient option for them.
Ransomware distribution methods
Most ransomware use more or less the same distribution methods, which include malicious email attachments, exploit kits, fake updates, torrents, and software cracks.
The majority of individual users get infected with ransomware when they open a malicious email attachment and enable macros. Launching an email spam campaign that distributes malware is one of the easier, low-effort ways. Cyber crooks purchase thousands of email addresses from hacking forums, and massively send out malicious emails to those addresses. Unless someone is targeted specifically, the emails are fairly obviously spam. They are sent from random email addresses while senders claim to be from legitimate companies and organizations, contain loads of grammar and spelling mistakes, and put pressure on users to open the email attachments. Since malicious emails can be sophisticated, it’s always recommended to scan unsolicited email attachments with anti-malware software or VirusTotal before opening them.
Malware can also often be encountered on various torrent sites/forums promoting pirated content and software cracks. It’s no secret that torrent sites are not regulated properly, allowing anyone to upload anything. Cyber criminals can easily disguise their malware as a popular episode of a TV series, movie, book, game, etc. Same goes for software cracks. Not only is downloading copyrighted content for free essentially stealing but it could also be dangerous for the computer.
Installing updates regularly is also important as the updates patch known vulnerabilities that can be used by malware to get in. During the notorious WannaCry ransomware attach back in 2017, the malware was able to infect so many systems because they did not have an important update installed. The Windows update was made available months prior to the attack. Whenever possible, users should enable automatic updates.
Boop ransomware removal
Users should not attempt to remove Boop ransomware manually because that would lead to even more damage. Instead, users should delete Boop ransomware via anti-malware software. The program would take care of everything but unfortunately, it would not decrypt files. While removing the ransomware as soon as possible is very important, files will still remain encrypted. They can only be decrypted with the special decryptor cyber crooks are trying to sell users. But files can easily be recovered via backup.
Boop ransomware is detected as:
- Trojan-Ransom.Win32.Stop.pl by Kaspersky
- Trojan.MalPack.GS by Malwarebytes
- Trojan:Win32/Ymacco.AA2A by Microsoft
- ML.Attribute.HighConfidence by Symantec
- Win32:RansomX-gen [Ransom] by Avast/AVG
- A Variant Of Win32/Kryptik.HFRI by ESET