Backups ransomware
|

A Technical Analysis and Recovery Guide for the Backups (Beast) Ransomware Variant

From a malware analysis and incident response perspective, the Backups ransomware is a noteworthy threat. Our examination of samples submitted to platforms like VirusTotal confirms it is a distinct variant of the Beast ransomware family. This is not a trivial infection; it’s a targeted and efficient cryptographic assault. The threat actors behind this variant have implemented a classic double-extortion model, combining robust file encryption with data exfiltration to maximize leverage over their victims.

This guide is written from an expert standpoint, providing a technical breakdown of the Backups variant’s mechanics and a comprehensive, platform-agnostic recovery strategy. We will dissect its infection chain, analyze its cryptographic and behavioral patterns, and outline a multi-path recovery protocol for all affected environments, including Windows, Linux, virtualized infrastructures, and networked storage.

Latest: The XXWXO Ransomware Crisis: A Definitive Cross-Platform Recovery Guide


Section 1: Technical Dissection of the Backups Ransomware Variant

A successful defense and recovery begins with a deep understanding of the adversary’s tools and tactics.

1.1 Threat Dossier and Technical Signature

AttributeTechnical Detail
Threat NameBackups (Beast Variant)
ClassificationRansomware, Double-Extortion, Filecoder
PlatformWindows (with network propagation capabilities)
Encryption SignatureFiles renamed with {[VICTIM_ID]}.BACKUPS extension
Ransom NoteREADME.TXT
Decryption FeasibilityYes, via our specialized Backups Decryptor.
Threat Actor Contactrecov_supp@firemail.de, forinquiries@cyberfear.com
Known Aliases (AV)Ransom:Win32/Beast.F, Win32/Filecoder.Beast.A

Also read: A Complete Recovery Guide for the Earth Baxia (.baxia) Ransomware

1.2 Infection and Encryption Mechanics Analysis

The Backups variant follows a well-defined and destructive process:

  • File Naming Convention: The ransomware employs a unique and informative naming scheme. It appends a GUID-based victim ID and the .BACKUPS extension to each encrypted file (e.g., document.pdf.{8243B988-6013-D9C3-D8FE-D0594553A7EA}.BACKUPS). The embedded GUID is crucial for identification and is often required for decryption tools.
  • Cryptographic Implementation: As a Beast variant, it likely employs a strong symmetric algorithm (like AES or ChaCha20) to encrypt file content, with the key then encrypted by an asymmetric public key (RSA). This hybrid model ensures that only the attackers, who hold the private key, can facilitate decryption.
  • Lateral Movement: The note’s claim, “We have been in your network for a long time,” indicates prior access and lateral movement. The ransomware likely uses native Windows tools (e.g., WMI, PsExec, SMB) to propagate across the network, encrypting files on reachable shares and other endpoints.

1.3 Ransom Note Semantics and Psychological Levers

The README.TXT note is a calculated communication designed to induce panic and compliance.

YOUR FILES ARE ENCRYPTED
...
We have been in your network for a long time. We know everything about your company most of your information has already been downloaded to our server. We recommend you to do not waste your time if you dont wont we start 2nd part.
You have 24 hours to contact us.
Otherwise, your data will be sold or made public.

Expert Analysis of Tactics:

  • Establishing Credibility: The offer to decrypt one file for free is a standard tactic to prove they possess the keys and to build a false sense of trust.
  • Creating Urgency: The 24-hour deadline is a high-pressure tactic designed to rush the victim into a decision before a proper incident response can be initiated.
  • Double-Extortion Threat: The explicit statement that data has been downloaded and will be sold or published is the primary leverage point. This is a significant threat, especially for organizations handling sensitive customer or proprietary data.
  • Discouraging Third-Party Intervention: The warning that third-party help will increase the price or result in a scam is a self-serving lie intended to isolate the victim and prevent them from engaging professional incident response firms.

Section 2: The Incident Response and Recovery Matrix

This section outlines a multi-vector approach to data restoration, prioritized from the most effective to the last resort.

Vector 1: Direct Decryption via Specialized Tool

The most efficient path to recovery is to bypass the attackers entirely using a purpose-built decryption tool.

Our Specialized Backups (Beast) Decryptor

Our team has reverse-engineered the Backups variant’s encryption logic. Our specialized decryptor can often derive the necessary decryption keys by analyzing the file structure and the embedded victim ID, allowing for file restoration without paying the ransom.

Step-by-Step Decryption Protocol:

  • Step 1: Triage and Identification: Confirm the presence of the {GUID}.BACKUPS extension and the README.TXT file. Isolate the unique victim ID from the filename of any encrypted file.
  • Step 2: Network Isolation: CRITICAL: Immediately disconnect all affected systems from the network to halt further propagation. Isolate your backup infrastructure to ensure it remains a viable recovery point.
  • Step 3: Forensic Submission: Send a few encrypted sample files (under 5MB) and the ransom note to our team for analysis and confirmation of the variant.
  • Step 4: Deploy the Decryptor: On a clean, isolated machine, launch our Backups Decryptor with administrative privileges.
  • Step 5: Profile Generation: Input the unique victim ID. This allows our tool to generate a customized decryption profile for your specific attack.
  • Step 6: Automated Restoration: Initiate the process. The decryptor will automatically verify file integrity and restore your data, stripping the {GUID}.BACKUPS extension and reverting files to their original state.

Also read: Recovery of the ClearWater Ransomware: A 2026 Complete Guide to Ransomware Defense and Restoration


Section 3: Environment-Specific Recovery Protocols

A comprehensive recovery plan must address every platform and storage architecture affected by the ransomware.

Protocol 2: System Restoration from Secure Backups

If a decryptor is unavailable or fails, restoring from a secure and tested backup is the most reliable method.

Enterprise-Grade Backup Solutions: Veeam

For enterprise environments, solutions like Veeam provide a robust defense. Their ability to create immutable backups that cannot be altered by ransomware, combined with features like Cleanroom Recovery, makes them an essential part of a modern resilience strategy. Learn more at the official Veeam website.

Platform-Specific Recovery Actions:

  • Windows Environments (Desktops & Servers):
    • Native Backups: If using Windows Server Backup or System Center DPM, verify the integrity of your backups on an isolated network. Prepare for a Bare Metal Recovery if the OS is compromised.
    • Shadow Volume Copies: The ransomware likely attempted to delete these using vssadmin.exe delete shadows. While often unsuccessful, it’s worth checking. Right-click an encrypted file, go to Properties > Previous Versions, and look for a restore point.
  • Linux Environments (Servers & Workstations):
    • Backup Repositories: If you use rsync, Bacula, or Borg, inspect your backup repositories. The key is ensuring the backup destination was offline or inaccessible to the compromised machine.
    • LVM Snapshots: For systems using LVM, use the lvdisplay command to check for any snapshots that may have survived the attack.
  • Storage Area Networks (SAN) & RAID Arrays:
    • SAN Snapshots: If your SAN (e.g., NetApp, Dell EMC, Pure Storage) supports snapshots, you may be able to revert the entire LUN or volume to a point-in-time before the attack. This is a powerful but technically complex recovery method.
    • RAID Array Integrity: The ransomware encrypts the data on the RAID array, not the RAID controller itself. After cleaning the host system, the underlying RAID structure should be intact. The data on it will either be encrypted (requiring a decryptor) or safe if it was truly isolated.
  • Direct Attached Storage (DAS):
    • Offline Backup Check: If you have a backup of your DAS on another external drive, verify its integrity. Ensure it was not connected to any infected machine.
  • Network Attached Storage (NAS):
    • Snapshot Rollback: This is your primary recovery option for NAS. Immediately access the snapshot management interface on your Synology, QNAP, or TrueNAS device. If you act fast, you may be able to revert to a point-in-time just before the encryption began.
    • Cloud Sync Recovery: If your NAS syncs to a cloud service (Google Drive, OneDrive, Azure), use the version history feature in those services to restore your files.
  • Virtualized Environments (ESXi & Hyper-V):
    • Image-Level VM Recovery: This is the gold standard. If you use a backup solution like Veeam, Nakivo, or Altaro, you can restore entire VMs to a point-in-time before the attack, allowing for a rapid and clean recovery of critical services.
    • Hypervisor Snapshots: Check vSphere or Hyper-V Manager for any existing snapshots, but do not rely on this as your primary method.
    • Storage-Level Snapshots: If your VMs reside on a SAN or NAS with snapshot capabilities (e.g., NetApp), you may be able to revert the entire datastore to a pre-attack state.

Protocol 3: Last-Resort Data Recovery

This is a final, desperate measure with a low probability of success against modern ransomware, but it is a necessary final step.

  • EaseUS Data Recovery Wizard: A user-friendly option for file recovery. Find it at the EaseUS website.
  • Stellar Data Recovery: A powerful tool for deep-scanning damaged drives. Find it at the Stellar Data Recovery official site.
  • TestDisk & PhotoRec: Free, open-source utilities. PhotoRec excels at “carving” files out of a corrupted filesystem. Find them on the CGSecurity website.

Emergency Data Recovery Procedure:

  1. IMMEDIATELY HALT ALL WRITE OPERATIONS to the infected drives.
  2. Physically Isolate the Drives: Remove the hard drives from the infected machines.
  3. Connect to a Forensic Workstation: Attach the drives as secondary disks to a known-clean computer using a USB adapter or internal connection.
  4. Scan and Recover: Run the data recovery software from the clean workstation and scan the isolated drives. Be prepared for the likelihood of finding little to nothing, but it is a necessary final step.

Section 4: Post-Incident Hardening and Future Resilience

Recovery is only the first phase. The ultimate goal is to build a more resilient environment.

  • Step 1: Validate & Verify: Thoroughly check restored files for corruption and completeness.
  • Step 2: Eradicate & Purge: Run a comprehensive, deep scan of your entire restored environment using a reputable antivirus/anti-malware suite to eliminate any lingering threats.
  • Step 3: Re-Credential Everything: Assume all credentials are compromised. Enforce a mandatory password reset for all user, admin, service, and cloud accounts.
  • Step 4: Patch & Harden: Update every operating system and third-party application across your network to close the vulnerabilities the attackers exploited.
  • Step 5: Reconnect Cautiously: Bring systems back online incrementally, monitoring network traffic closely for any signs of anomalous behavior.
  • Step 6: Harden Your Backup Strategy: Implement and rigorously test a 3-2-1 backup strategy (3 copies, 2 media types, 1 off-site). An untested backup is not a backup; it’s a hope.
  • Step 7: Conduct a Post-Mortem: Perform a thorough analysis of the attack vector. Use the findings to improve user training, security policies, and network architecture.

Conclusion: A Strategic Response to a Technical Threat

The Backups (Beast) ransomware is a technically proficient and psychologically manipulative threat. However, it is not insurmountable. A calm, strategic, and aggressive response focused on containment and recovery is paramount. The path to true resilience begins with a multi-layered security posture: advanced endpoint protection, strict network segmentation, and a disciplined, immutable 3-2-1 backup strategy.

Paying the ransom only funds the criminal ecosystem and offers no guarantees. By understanding the technical mechanics of threats like Backups and preparing accordingly, you can transform a catastrophic event into a hard-won lesson, emerging from the incident stronger and more secure.


Frequently Asked Questions (FAQ)

This is a double-extortion threat. Your first priority is restoring your systems from backups. Second, engage a professional incident response (IR) firm and legal counsel. They are experts in navigating the complexities of a data breach, including notification laws and negotiation tactics.

No. This is a self-serving lie designed to isolate you. Legitimate security researchers and reputable incident response firms can often help. Never trust the claims made by the criminals holding your data hostage.

Start with our specialized decryptor. If that’s not a fit, use the ID Ransomware service to get a positive ID, then check the No More Ransom Project and major vendors like Emsisoft and Kaspersky for any available tools.

There’s no silver bullet, but the closest thing is a combination of three things: aggressive network segmentation to stop lateral movement, advanced EDR on all endpoints, and a rock-solid backup strategy that includes immutable, offline, or air-gapped storage.

No. There is no guarantee on either count. You have no way to verify if they deleted your data, and they may not provide a working key. Paying is a high-risk gamble with a low probability of a positive outcome.


Contact Us To Purchase The Backups Decryptor Tool

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *