Jump to content

Recommended Posts

  • ExTS Admin
Posted

DXXD ransomware v1 decrypted, v2 undecryptable

 

http://img.photobucket.com/albums/v708/starbuck50/dxxd-ransomware-shows-ransom-note-using-windows-legal-notice-screen-509149-2_zpsjot1cxzi.jpg

 

A new ransomware that goes by the name of DXXD uses the Windows Legal Notice screen to show a ransom note even before the user logs on his or her computer.

 

The Windows Legal Notice screen is an intermediary screen that appears before the Windows login form and, as its name hints, it's there for the purpose of showing various types of legal notices and other messages before a user can use the PC.

 

This is the first time a ransomware author has used the Legal Notice screen to show a ransom note, but won't be the last.

 

A very efficient way of delivering a ransom note

 

While users can dismiss the notice by pressing the "Ok" button, the screen does its job and gets the user's attention.

 

Users who encounter these screens and then log on their computers will find some of their files encrypted by the DXXD ransomware, a new threat that appeared towards the end of September.

 

Besides the obvious Legal Notice message, which appears because the ransomware added two registry keys to infected Windows PC, spotting the DXXD ransomware is easy because it appends the "dxxd" string to all of the user's encrypted files, with a file like "photo.png" becoming "photo.pngdxxd."

 

DXXD 2.0 released after researchers cracked the first version

 

DXXD is already at version 2.0 after security researcher Michael Gillespie cracked the ransomware at the start of the month and released a free decrypter on the Bleeping Computer forums.

 

Following the release of this tool, the author of the DXXD ransomware created a new ransomware version, which fixed the encryption flaw that allowed the decrypter to work.

 

In fact, the ransomware's author has created an account on the Bleeping Computer forums so he can taunt Gillespie that he defeated his decrypter.

The author of the Apocalypse ransomware joined in taunting the researcher, showing his support for a fellow crook.

 

DXXD author claims he's in possession of a Windows 0-day

 

The DXXD author also tried to throw researchers off his tracks by claiming he infects computers using a zero-day RCE exploit that affects all Windows versions released between 1995 and 2016.

 

This is highly unlikely, and a zero-day like this would be valued at millions of dollars, and most likely used for something more heinous than just installing shoddy ransomware.

 

Lawrence Abrams, Bleeping Computer founder, didn't buy into this false flag.

"Based on information discovered, I believe that the ransomware developer is hacking into servers using Remote Desktop Services and brute forcing passwords," Abrams says. "If you have been affected by the DXDD Ransomware, you should reset all the passwords for the affected machine."

 

Currently, there's no way to decrypt files locked by the DXXD 2.0 version.

This is because researchers haven't had the opportunity to take a look at the source code of the DXXD 2.0 version just yet.

 

Victims of the DXXD ransomware are advised to not pay the ransom since researchers suspect they might be able to crack this version as well.

Victims should get in contact with Gillespie or Abrams via the DXXD ransomware support topic on the Bleeping Computer forums.

 

 

UPDATE: Good news from Michael Gillespie.

 

Hit by #DXXD #Ransomware? Decrypter is in the works thanks to help from @fwosar, victims contact me for beta testing.

http://img.photobucket.com/albums/v708/starbuck50/dxxd-ransomware-shows-ransom-note-using-windows-legal-notice-screen-509149-3_zpsapu9jh4k.jpg

 

 

 

Source:

http://news.softpedia.com/news/dxxd-ransomware-shows-ransom-note-using-windows-legal-notice-screen-509149.shtml

Member of:

UNITE

  • 3 weeks later...
  • Replies 5
  • Created
  • Last Reply

Top Posters In This Topic

  • ExTS Admin
Posted

Hi Ray,

 

MalwareBytes Anti Ransomware is designed to stop the encryption of your files etc.

The notice that is displayed with this ransomware doesn't actually do anything... it's only there to get the message across.

It's the actual encryption process that needs to be detected and blocked and this is done by MBAR.

So it's the process of ransomware that is detected and not the ransomware variant.... as such it shouldn't matter what the ransomware variant is called, the process should be blocked.

 

Hope that answers your question.

Member of:

UNITE

Posted

So surely EVERYONE should have this free programme as it blocks any reansomware attacks!

Seems too good to be true but I have downloaded it and got it running!

Ray

  • ExTS Admin
Posted
So surely EVERYONE should have this free programme as it blocks any reansomware attacks!

Yes and No.

Some AV companies are building this type of security into their products.

These are 2 that I know of...

 

Emsisoft Anti-Malware 12

ESET Antivirus and Smart Security

 

Also, MBAR isn't the only kid on the block protecting against Ransomware.

These products also perform the same type of protection...

 

Bitdefender Anti-Ransomware

HitmanPro.Alert

CryptoPrevent

WinAntiRansom

Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)

 

So, yes everyone should have protection of some sort... but there is a choice. ( although not all of these are 'free')

Member of:

UNITE

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...