• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

DDE Ransomware

August 14, 2018Simeon Georgiev

Ransomware removal experts are becoming overwhelmed by the number of ransomware discovered daily. This time the culprit is known as DDE Ransomware. The ransomware was unearthed on 25 July 2018. The ransomware has not yet displayed any distinct features and so far it has been considered similar to other ransomware.  

Ransomware removal analysts have theorized it to be an updated version of the Crypt888FRansomware while its encryption methodologies bear similarity to the Ghost Army Ransomware. It has also been reported that the ransomware manages its infiltration in more than 50 systems. The ransomware has gotten its name from its malicious file ‘dde_ransomware.exe’. The name also serves the purpose of distinguishing it from the original ransomware.

According to ransomware removal experts, the ransomware infects a computer system when a victim opens a malicious file attachment that is macro-enabled. The file serves as a payload and the malicious scripts incorporated within it bypasses the system’s security and manages to link the Windows OS to a remote location. Afterward, an encrypted shell is downloaded to the system which then installs the DDE Ransomware completely in the victim’s PC. Subsequently, the ransomware begins to analyze and scan the PC so that any possible files can be found that could be encrypted.

Then the ransomware begins its encryption procedure. After it encrypts the files saved on the hard disk and appends its own extension. This means if a user had a file name ‘officedocument.txt’ then the file’s name will appear to be ‘officedocument.txt.encrypted’. The files that can be affected include multimedia files and office documents including popular extensions like .txt, .ppt, .xls, .mp4 etc.

After the encryption is completed, a ransom file is added into the desktop. The file has an extension of .html or .txt. The file contains text from the cybercriminals that state that a ransom has to be paid through TOR browser in the form of bitcoin.

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Ransomware Attack Paralyzes Suburban Alaskan Borough Next post SamSam Ransomware Collected $6 Million in Ransom

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.