Remove B4WQ Virus (B2DR Ransomware) – Restore .B4WQ Files

B4WQ Virus image ransomware note .B4WQ extension

The B4WQ virus is ransomware that is descendant from the earlier B2DR threat. Like its parent it uses a modular engine that seeks to encrypt sensitive personal files. Our article explores the technical aspect of the infections and shows how victims can remove active infections.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .B4WQ extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by B4WQ

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss B4WQ.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

B4WQ Virus – Distribution Ways

The B4WQ virus is a newly reported ransomware that is being distributed in a small attack campaign. Due to the limited reports the analyst cannot trace down the preferred method of distribution, consequently all of the popular ones can be used.

The criminals can use email SPAM messages that rely on social engineering tricks that manipulate the recipients into interacting with the malicious content. The B4WQ virus can be either directly attached to the messages or hyperlinked in the body contents. They are also the main delivery method for distributing payload carriers. Two of the most popular types are the following:

  • Infected Documents — The B4WQ virus code can be embedded in files of various types: text files, spreadsheets or presentations. The mechanism depends on a script execution (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: