Home Malware Programs Ransomware DilmaLocker Ransomware

DilmaLocker Ransomware

Posted: September 8, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 97
First Seen: September 8, 2017
OS(es) Affected: Windows


The DilmaLocker Ransomware is a Trojan that gains access to your PC by pretending to be a safe content, and then, encrypts your files. Expected symptoms of a DilmaLocker Ransomware infection include the appending of a custom extension to the names of any locked media, wallpaper hijackings, and pop-up alerts. Victims may recover their files through backups or accept help from third-party malware researchers for a chance at decryption, and uninstalling the DilmaLocker Ransomware should use anti-malware products designed for detecting similar threats.

A Mascot Hijacked for Data Attacks

Although it's known for being a playground for banking spyware primarily, Brazil also may be receiving new software problems in the form of harmful encryption. The new threat that's presenting this payload, the DilmaLocker Ransomware, is compromising PCs by pretending that its installer is a resume (using a false extension) or a package for Adobe's Acrobat Reader. The DilmaLocker Ransomware proceeds to take the victim's files hostage after being installed.

The DilmaLocker Ransomware uses an AES-256 encoding routine for encrypting text documents and similar media while showing no symptoms of the ongoing process. All files that the DilmaLocker Ransomware encrypts display '.__dilmaV1' extensions. The Trojan completes its attacks with a brief pop-up alert and by swapping out the user's desktop image with its ransoming message.

Unsurprisingly, given its name, the DilmaLocker Ransomware's instructions use the theme of 'Dilma Bolada,' the Web mascot of Brazilian president Dilma Rousseff. The text also uses Portuguese, asks for payment in Brazilian Real, and gives the victim four days to pay for the decryption code. The ransoms are at the equivalent of a thousand USD or more, which makes the DilmaLocker Ransomware one of the most expensive of South American, file-encoding threats in malware experts' analyses.

Taking Your Computer Back from Political Mockery

While most aspects of the DilmaLocker Ransomware's payload target Brazilian PC users blatantly, encryption is capable of damaging the files of any PC without respect for its local language settings or IP address-implied region of residence. Since the DilmaLocker Ransomware uses at least two formats of distinct, separate disguises for concealing itself notably, users should be suspicious of any downloadable content that could serve as its infection vector, including email attachments particularly. Malware researchers have yet to provide word on whether the DilmaLocker Ransomware's encryption is likely to be breakable by third parties.

Due to decoding any files that the DilmaLocker Ransomware blocks not being possible necessarily, backing up your work may be the only viable solution for keeping them preserved from this threat's encryption attacks. You should avoid exposing any detached backup devices to a compromised PC until after your anti-malware solutions delete the DilmaLocker Ransomware. Detachable storage drives are highly viable recovery options against this threat, although default backups stored by Windows, such as the Shadow Copies, are at risk of non-consensual deletion.

A brand name can be a form of power, both for its user and its audience. However, in the DilmaLocker Ransomware's instance, the advantage appears to lie on the side of any victim, who can use this threat's symptoms for identifying an infection quickly and, then, formulate a proper response.

Loading...