Backmydata

Description

BackMyData is a variant of the Phobos ransomware family, first observed in early 2024. It follows a double‑extortion model: encrypting files and threatening data exposure. The ransomware primarily targets organizations via weak or misconfigured RDP access (e.g., remote desktop services), though phishing and initial-stage payloads like SmokeLoader have also been noted. Technical behavior includes AES‑256 file encryption, with keys secured via a public RSA‑2048 key embedded in the binary. Post-infection actions involve disabling firewalls, deleting volume shadow copies, inhibiting recovery functionality, and establishing persistence through registry Run keys and startup folder entries. Encrypted files receive the extension .BACKMYDATA, and victims are left with ransom notes (info.txt, info.hta, or .backmydata) that instruct them to contact attackers via email or Session Messenger. A significant incident involved a coordinated attack on Romania’s Hipocrate Information System (HIS), impacting 26 hospitals and causing widespread system outages across nearly 100 facilities, with ransom demands of approximately 3.5 BTC (~$175,000).

External Analysis
https://www.sentinelone.com/anthology/backmydata/
https://gurucul.com/blog/backmydata-ransomware/
https://www.securityweek.com/ransomware-attack-knocks-100-romanian-hospitals-offline/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060a
Mail
backmydata@skiff.com
Urls
Screen
File servers
Screen
Chat servers
Screen
Admin servers
Screen