• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

The Dharma Ransomware

March 29, 2018Simeon Georgiev

One of the variants of the Crysis ransomware, Dharma is the latest in the line of high risk ransomware attacks. After it successfully infiltrates the computer, it begins to append the “.arrow”, “.java” and “.[[email protected]].wallet” extensions to each of the encrypted files. While the previous versions changed the desktop background, they would place a text file in each compromised folder containing the ransomware attack. The typical name of such documents is README.txt and Document.txt.[[email protected]].zzzzz.

As the name suggests, the virus has been designed to attack the user base in India.  Dharma displays a short message stating that the victim has had their computer security compromised, but their security issue can be solved by making contact with the developers on their email addresses provided. One of those email addresses is [email protected]. Once the victims have been able to make contact with the developers, they are given further instructions on how they could obtain their decryption keys.

The cyber criminals claim that decrypting files without the key is impossible and make suitable ransom demands. The cost they place on each user varies, but the typical range can stretch from $500 to $1000 in bitcoins. Once the payment is made to the criminals, users should be wary that the cyber criminals might just ignore the victims.

The best practice we would advise our readers is to not make any contact with the cyber criminals or make payments to them. These only serve to encourage them to scam more victims. Currently, manually restoring the encrypted files is impossible because no tools have been designed with the specific purpose of decrypting the Dharma ransomware attack.

At present, the only solution is to restore the files and system from a backup utility, if you don’t already have a backup utility.

Some of the common pitfalls of the internet include:

  • Clicking on fake download buttons and pictures.
  • Clicking on fraudulent PayPal links.
  • Links which contain attachments to fake e-mails and other areas of the internet. 

While it is possible to remove the Dharma Ransomware virus from your system, it isn’t possible to decrypt the encrypted files without the keys.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post AVCrypt Ransomware Deletes Your Anti-Virus Next post Baltimore’s Emergency Dispatch Under Ransomware Attack

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.