If you follow cybersecurity news, then you are no stranger to the fact that ransomware continues to grow as cybercrime has become a lucrative business over the past several years. New strains are created and discovered on a daily basis, and one of the more problematic ransomware variants out there is SolidBit Ransomware. If you periodically install applications from misleading and/or potentially unreliable third-party sites, you may unknowingly install ransomware like Solidbit Ransomware on your computer.
Solidbit Ransomware encrypts multiple file types, including photos, music, documents, and videos, and generates a random 4-character string that it appends to the original name of each encrypted file. After file encryption, SolidBit Ransomware will leave two different ransom notes on the breached device. One is displayed as a pop-up window, while the other will be dropped as a text file named ‘RESTORE-MY-FILES.txt.’
The hackers behind SolidBit Ransomware instruct their victims to visit their website hosted on the TOR network. Opening the given link requires the users to install the TOR browser. Once victims land on the page, they learn that SolidBit Ransomware uses a combination of the AES and RSA cryptographic algorithms in its encryption process.
The hackers behind Solidbit Ransomware also state that they are willing to demonstrate their ability to restore locked files by decrypting one file for free, as long as the chosen file is less than 1MB in size.
How Do I Deal with the SolidBit Ransomware Attack?
To protect yourself from the SolidBit Ransomware attack, you should have a reputable malware remediation tool installed on your computer. That way, you can constantly scan for elements associated with this troublesome ransomware infection, as well as other malware. To mitigate the potential damage to your files, do not forget to back them up on an external hard drive or virtual cloud storage.