Home Malware Programs Ransomware Damoclis Ransomware

Damoclis Ransomware

Posted: November 1, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 1,696
First Seen: November 1, 2017
Last Seen: June 14, 2023
OS(es) Affected: Windows

The Damoclis Ransomware is a minor variant of the Losers Ransomware, a branch of the Crypton Ransomware family of file-locking threats. Like its predecessors, the Damoclis Ransomware tries to block data on your PC by encoding it using the AES encryption so that it can demand you to pay for recovering them. Related symptoms often include both cosmetic changes and the deletion of associated content, and malware experts suggest identifying and uninstalling the Damoclis Ransomware with a trustworthy anti-malware vendor's products.

A Loser Trying to Come Back as a Winner

Although not as publicly acknowledged as more active threats like the Turkish-made Hidden Tear, the Crypton Ransomware family has yet to fall into the level of complete inactivity that would suggest that its threat actors are switching to other Trojan designs. One minor fork in this collection of file-locking Trojans, the Losers Ransomware, is even seeing a revival through a slight variant: the Damoclis Ransomware. This semi-new Trojan has some small updates to its ransoming demands and maintains the same capabilities for deleting or blocking data, potentially, beyond the victim's ability to retrieve.

The Damoclis Ransomware, whose name apparently is a derivative of the Greek name 'Damocles,' conducts attacks targeting English-speaking PC users, although such language configurations are common to Trojans circulating throughout much of the world. When running, it uses cryptography with a Rijndael or AES-based cipher to encode selected formats of files on the PC's drives, usually including text documents, spreadsheets, informational databases and pictures (although, unusually, the Damoclis Ransomware avoids locking PDFs or ZIP archives). The Damoclis Ransomware includes a custom extension for signifying which files it's holding hostage ('.damoclis') but, as a variant of Losers Ransomware, it also may use the old '.losers' tag.

The Damoclis Ransomware and other variants of the Crypton Ransomware's family use a series of TOR-supported websites to collect their ransoms for decrypting and restoring the blocked media. The Damoclis Ransomware promotes this payment process by delivering advanced HTML pop-ups that contain instructions on how to use TOR to navigate to the site and input a custom-generated ID. Since the Damoclis Ransomware's family also erases default Windows backups, this recovery method, while not endorsed by malware experts, may be the only way to restore a victim's files.

Keeping the Proverbial Sword from Hovering over Your PC's Head

The anecdote of a sword suspended over the head of a ruler, known as the 'Sword of Damocles,' makes for an appropriate theme with the Damoclis Ransomware. However, also like the original story, the Damoclis Ransomware comes with an implied escape for the victim: keeping backups in secure devices, such as detachable peripheral drives, can remove any risk of permanent damage from the Damoclis Ransomware's attacks. Since malware experts sometimes rate members of Crypton Ransomware as being compatible with free decryption programs, victims without backups also may test duplicates of any locked files with the appropriate freeware solutions.

Always update your anti-malware products to improve their capabilities against new variants of older Trojans, including the Damoclis Ransomware, which may avoid detection through previously effective methods. Distribution efforts for this Trojan may be using spam e-mails, corrupted website scripts, or downloads named inaccurately to trick users into compromising their PCs. Most of these attacks are wholly preventable by having appropriate security software and disabling hazardous content features. Most anti-malware programs should have limited or no issues with uninstalling the Damoclis Ransomware from your computer, although unlocking data via decryption always requires separate and specialized software.

Malware experts only can guess at where the Damoclis Ransomware's campaign is most likely to strike next. With generalized attributes making it suitable for blocking files around the world, the Damoclis Ransomware is a pointed reminder not to count the Crypton Ransomware family out of the threat landscape yet.

Loading...