Avast Threat Labs created and released a free Babuk Decryption tool using leaked source code and leaked decryption keys for victims with files encrypted by the following extensions: .babuk, .babyk, .doydo.
Cisco Talos obtained a decryption tool for the Tortilla variant of Babuk in January 2024 after the criminal was arrested.
Avast Threat Labs updated Babuk Ransomware Decryptor in January 2024.
A threat actor has begun to utilize a leaked Babuk Locker ransomware builder to launch a new 'Babuck Locker' campaign targeting victims all over the world.
The ransomware will append the .babyk extension to encrypted files and drop a ransom note named How To Restore Your Files.txt.
The threat actor is asking for .006 bitcoins to be sent to a bitcoin address and has provided a email address of babuckransom@tutanota.com.
If you were hit by this ransomware, please share how you were infected.