• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Dablio Ransomware

December 15, 2018Simeon Georgiev

Ransomware operators are constantly developing new cryptovirological strains. This is the reason why malware hunters are always busy detecting any new form of ransomware or a variant from an existing cryptovirological family. In the latest scavenging outing, cybersecurity researchers have stumbled upon a new ransomware strain that goes with the name Dablio. According to preliminary investigations by ransomware removal experts, Dablio is written in Python programming language. Some earlier ransomware scripts were also worked out in Python.

Ransomware strains usually append a marker after the extension of the locked down file. However, Dablio is unique in this aspect. Instead of affixing a new extension to the affected files, it appends the word ‘encrypted’ before the file name.

As soon as encryption of the files completes, a ransom note appears on the desktop screen of the affected device. From the content of the note, it looks like the attackers are not willing to give any concession to the targeted users. For instance, they are not offering free decryption of a couple of files, which is an unwritten norm in such illicit cyber activities.

The Attackers haven’t mentioned the extortion amount for providing the ransomware removal key. Nevertheless, they have provided a link in the note for the affected users to buy Bitcoins— the standard currency that is used to pay extortions to ransomware operators.

Experts are still trying to figure out the method used by Dablio operators to deliver the payload of the malware. There are strong chances that they have used a spam email campaign for infiltrating many devices all at once.  Ransomware removal experts, therefore, always advise against downloading any email attachment from unknown senders no matter how legitimate they look.

Experts have also noticed that apart from encrypting stored files, Dablio is also slowing down the computation of targeted devices, which suggests that they might also be used for mining cryptocurrency.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post High-value targets, Bigger Paydays Next post Ransomware Clean Up an Issue for Managed Service Providers in Europe

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.