<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p class="p1"><span class="s1">A new ransomware variant that debuted this month, rumored to be made by the creators of Locky, has quickly become a variant to watch out for. Bart ransomware shares a number of <a href="http://phishme.com/rockloader-downloading-new-ransomware-bart/">characteristics</a> with Locky which makes the "look and feel" of the ransomware similar, yet it is distinct because of two special traits. The first is its way of isolating the victim from his/her files - instead of using a strong asymetric encryption, like most ransomware variants today, Bart moves the user's files into individual zip archives and applies password protection to each of them. Also, Bart does not seem to use Control and Command servers, but rather relies on a distinct ID for each victim which will be relayed to the criminals during payment.</span></p> <!--more--><p class="p1"><span class="s1">One of the prominent ties to Locky is the distribution method used to distribute Bart - Rockloader, Locky's custom downloader. This infection chain has been spotted targeting victims via phishing email campaigns. Bart is spreading quickly, mostly <a href="http://phishme.com/rockloader-downloading-new-ransomware-bart/">targeting</a> the United States, Germany, France and the United Kingdom. The ransomware does not run if it determines the user's system language is Russian, Ukrainian, or Belorussian. One of the most disturbing facts about the new ransomware is the steep price it is asking for - 3 bitcoins.&nbsp;</span></p> <p class="p1"><span class="s1">ThreatSTOP customers are protected from Bart ransomware, as well as Rockloader downloader and Locky ransomware.</span></p></span>