Backups Ransomware Decryption and Removal Using Phobos Decryptor

What Is the “Backups” Malware?

Backups is a ransomware strain discovered in VirusTotal submissions. Once it infiltrates a system, it encrypts victim files and adds both an email address and the .backups extension to affected files—for example, renaming 1.jpg to 1.jpg.[[email protected]].backups or 2.png to 2.png.[[email protected]].backups.

It also changes the desktop background and drops a ransom instruction text file named #HowToRecover.txt, accompanied by a threatening note and instructions to email the attackers.

Related article: Direwolf Ransomware Decryption and Removal Using Phobos Decryptor


How Does Backups Operate?

RSA/AES-Based Encryption

Backups employs robust cryptographic measures to lock users’ data, making file recovery without the attackers’ private key practically impossible.

Also read: 9062 Ransomware Decryption and Removal Using Phobos Decryptor

Ransom Message Delivery

The desktop wallpaper is replaced, and a ransom note text file is placed in accessible directories, ensuring visibility to the victim.

The attackers claim they’ve retained copies of encrypted data, threatening to sell it to competitors or publish it on dark web forums. They demand payment within 48 hours—warning the price will double if the deadline is missed.


Full Ransom Note

!!!All of your files are encrypted!!!

To decrypt them send e-mail to this address:

Write the ID in the email subject

ID: –

Email 1 : [email protected]

To ensure decryption you can send 1-2 files less than 1MB we will decrypt it for free.

We have backups of all your files. If you dont pay us we will sell all the files to your competitors

and place them in the dark web with your companys domain extension.

IF 48 HOURS PASS WITHOUT YOUR ATTENTION, BRACE YOURSELF FOR A DOUBLED PRICE.

WE DON’T PLAY AROUND HERE, TAKE THE HOURS SERIOUSLY.

Email us for recovery: [email protected]

In case of no answer, send to this email:

[email protected]

Your unqiue ID:


What Happens to the System?

  • File Encryption: All accessible files are encrypted and renamed with .backups and the attackers’ email.
  • Desktop Change: Wallpaper is altered to display ransom instructions.
  • Note File: A ransom note (#HowToRecover.txt) is deposited for easy access.

Ransomware Impact & Threat Scope

This ransomware variant specifically targets QNAP and other NAS devices, as well as network-connected storage. It poses a severe threat to backups and shared repositories—not isolated to typical desktops. QNAP publicly warns its users to update firmware, disable internet-exposed ports, and employ malware scanners—especially in light of other NAS-targeting ransomware like Qlocker, eCh0raix, AgeLocker, and DeadBol


Distribution Channels

Backups hangs onto several common ransomware infection methods:

  • Malicious email attachments or phishing links
  • Pirated software cracks or keygens bundled with malware
  • Exploit kits targeting vulnerabilities in outdated applications
  • Fake pop-up ads or download prompts
  • P2P file-sharing, wrapping executables or archives with malicious payloads
  • Disguised malware in ZIP/RAR archives, ISO files, Microsoft Office docs, PowerShell scripts, etc.

Signs of Backups Infection

  • Files become unreadable and are renamed with the .backups extension
  • Desktop wallpaper changes to ransom instructions
  • Presence of #HowToRecover.txt in directories
  • Email contacts in ransom notes: [email protected] / [email protected]

Known Detection by Antivirus Vendors

Security software flags this malware under various names:

  • Avast: Win32:MalwareX-gen [Ransom]
  • Combo Cleaner: Gen:Variant.Lazy.335837
  • ESET‑NOD32: Variant Of Win32/Filecoder.OOY
  • Kaspersky: HEUR:Trojan-Ransom.Win32.Generic
  • Microsoft Defender: Ransom:Win32/Conti!rfn
  • Numerous detections cataloged in VirusTotal scans.

Recovery: What You Can—and Can’t—Do

  1. Restore from Backup
    The only reliable recovery approach is restoring clean copies. If your QNAP or NAS device was encrypted, ensure your restore point exists on a locked-down volume or offline backup, such as one protected using QNAP’s Snapshot feature
  2. Ransomware Removal
    Clean all ransomware components before restoring data to prevent reinfection. Tools like Combo Cleaner (Windows), Malware Remover (QNAP), or reputable AV solutions should be used.
  3. Decryptors Are Unavailable
    No free or third-party decryptor has been released for Backups so far. It’s possible—but not guaranteed—that one may appear if security researchers analyze the ransomware’s code.

Typical Infection Vectors

  • Email phishing: attachments or malicious links
  • Cracked software or keygens
  • Exploited vulnerabilities in outdated OS/apps
  • Pop-up ads, fake updates, unsafe downloads
  • P2P and torrent swarms injecting malware
  • Executable or archive disguises (.exe, .doc, .zip, .iso, .js)

Threat Summary

AspectDetails
Malware NameBackups Ransomware
Threat TypeCrypto Ransomware
Encrypted File Extension.backups (e.g., file.txt.[[email protected]].backups)
Ransom Message File#HowToRecover.txt
Decryptor Available?No known tool at present
Attacker Email[email protected] / [email protected]
Antivirus Detection NamesMultiple (see above)
Typical Infection MethodsEmail, cracks, exploits, fake downloads, P2P
SymptomsEncrypted files, wallpaper change, ransom note
DamageData encrypted; potential additional malware installation
Recommended Removal (Windows)Use legitimate AV/Combo Cleaner
Recommended Removal (NAS)QNAP Malware Remover and firmware update
Prevention MethodsRegular backups, secure update practices, safe browsing

Protecting Your Devices

Robust Backup Strategy

  • Adhere to the 3-2-1 rule: 3 copies, 2 media types, 1 off-site or air‑gapped.
  • For QNAP users, snapshots allow fast recovery even if files are encrypted

System Updates & Defense-in-Depth

  • Keep OS, apps, firmware, and NAS systems updated with security patches.
  • Use strong, unique passwords and disable unnecessary services (e.g., UPnP, default ports)
  • Employ reputable antivirus and anti-malware tools.
  • Exercise caution with email attachments, cracked software, and web downloads.

NAS-Hardening Measures

  • Restrict network exposure by disabling internet-port forwarding.
  • Use two-factor authentication and unique credentials.
  • Install vendor-recommended malware scanners.
  • Consider air-gapped, immutable backups (e.g., QNAP Airgap+ / HBS)

Recovering Files Encrypted by Backups Ransomware: Can Our Decryptor Help?

If your system has been infected with Backups ransomware, you’re likely dealing with a serious disruption—your data has been locked, and a ransom is being demanded for decryption. Fortunately, there is a secure and effective way to recover your files: our exclusive Phobos Decryptor is designed to help you restore access without having to negotiate or pay the attackers.

Whether your files reside on personal computers, enterprise networks, or NAS systems such as QNAP that were compromised through shared credentials or unsecured remote access, the Phobos Decryptor is engineered to handle even complex file recovery scenarios.


How Our Phobos Decryptor Can Help You Restore Your Files?

The Phobos Decryptor is fully compatible with ransomware strains like Backups, providing a reliable solution for regaining access to .backups-encrypted files. Instead of yielding to ransom demands, you can initiate safe and efficient file recovery.

This includes retrieving data from QNAP backup volumes and NAS environments that were encrypted due to exploits involving shared SMB access or weak authentication protocols.


Why Our Phobos Decryptor Is the Right Solution for Backups Ransomware?

  • Custom-Built for Backups Ransomware
    This tool has been precisely developed to counteract file encryption performed by the Backups variant.
  • User-Friendly and Efficient
    No technical knowledge is necessary. The process is intuitive and designed for quick recovery.
  • Maintains Data Integrity
    Unlike unreliable tools that may corrupt data, the Phobos Decryptor protects the integrity of every file during the process.

Even if your QNAP NAS was targeted—resulting in encrypted volumes or partial data loss—the decryptor may still be able to access and recover .backups files, provided the storage hardware remains functional.


Steps to Use the Phobos Decryptor for .backups Files

If your system has been compromised by the Backups ransomware, follow these steps to recover your encrypted files:

Step 1: Secure Your Copy
Contact us to purchase the Phobos Decryptor and gain immediate access to the recovery tool.

Step 2: Launch the Tool with Administrator Rights
Open the decryptor on the infected system with admin privileges and ensure that the device is connected to the internet.

Step 3: Connect to Our Secure Servers
The tool will securely communicate with our servers to generate the decryption keys specific to your infection.

Step 4: Enter Your Victim ID
Retrieve your unique victim ID from the #HowToRecover.txt ransom note and input it into the application.

Step 5: Begin the Decryption Process
Click on “Decrypt” and allow the tool to restore your files—safely and efficiently.

Also read: Helper Ransomware Decryption and Removal Using Phobos Decryptor


Why Trust Our Phobos Decryptor Over Other Recovery Tools?

  • Field-Tested for Backups Ransomware
    Extensively tested across numerous systems impacted by the .backups extension, with verified results.
  • Guaranteed Data Protection
    Ensures that files remain unharmed throughout the recovery process.
  • Expert Remote Support
    Our cybersecurity specialists are available to guide you through each stage of recovery.
  • Avoid Paying Ransoms
    Regain control of your files legally and securely—without funding criminal operations.

Whether you are restoring data from a single device, a business network, or a QNAP NAS system, the Phobos Decryptor offers a comprehensive, scalable solution to help you recover quickly and avoid prolonged downtime or financial loss.

Final Takeaways

Backups ransomware is a potent file-encrypting malware designed to disrupt operations and extort payment. Recovery without clean backups is essentially impossible at this time. It strikes both desktops and NAS systems—particularly QNAP and other network storage environments. The best defense is a proactive, multi-layered strategy emphasizing immutable backups, vigilant updates, strong credentials, and safe digital habits.

Leave a Comment