Home Malware Programs Ransomware DarkKomet Ransomware

DarkKomet Ransomware

Posted: June 28, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 14,896
First Seen: June 28, 2017
Last Seen: September 1, 2020
OS(es) Affected: Windows

The DarkKomet Ransomware is a Trojan that grants third parties remote access to your computer, as well as locks your files with encryption to hold them for ransom. Because this Trojan's backdoor features can enable other attacks besides those included in its payload, you may see other symptoms, in addition to changes to your files and desktop. Victims should disconnect from the Internet while removing the DarkKomet Ransomware with anti-malware tools, and then recover any locked content from a backup.

Trojans with Backup Plans for Attacking Your Computer

Although most Trojans specialize, like ants, in highly specific tasks pertinent to their ecosystem, sometimes, threat actors prefer bundling different features into a single threat wildly. File-encrypting Trojans like the DarkKomet Ransomware may seem to be all too common, but less noted frequently is the second half of this program's payload: a backdoor feature. This newly discovered Trojan includes features for giving con artists network-based infiltration of your PC, along with encrypting its files.

Malware analysts are estimating that the DarkKomet Ransomware is cobbled together from the preexisting code of two different sources: Hidden Tear, which provides the data encryption, and DarkComet, which provides the RAT (Remote Administration Tool). The DarkKomet Ransomware's Hidden Tear-based features encode your documents and other media with an AES cipher, append '.locked' extensions onto their names, and deliver ransom-themed messages via text files and hijacking your desktop's wallpaper.

On the other hand, the DarkKomet Ransomware's backdoor functionality gives a remote attacker control over the infected PC theoretically, which could lead to a variety of different, manual attacks. The attacker could install other Trojans, delete files (such as backups that the DarkKomet Ransomware's Hidden Tear half has missed), change system settings, or collect your files directly. The DarkComet RAT that the DarkKomet Ransomware is borrowing code from also includes some spying features, such as keylogging, which can record the user's typing input.

Swatting the DarkKomet Ransomware out of the Sky

By distracting its victims with the high-visibility attack against their files, the DarkKomet Ransomware could lead them to believe that restoring their data or paying the ransom it demands will resolve the security issue. Meanwhile, remote attackers could enjoy the fruits of having backdoor access to the PC, such as perusing files or disabling essential security features like firewalls. Although malware experts have yet to confirm many attacks utilizing this threat, the DarkKomet Ransomware's payload is well suited to compromising multiple-system, corporate networks particularly.

PC users without backups to recover any locked content should make copies of their encrypted media and test the compatibility of current Hidden Tear decryptors that the security industry provides for free. Any infected PCs should have all network access disabled immediately to minimize the impact of the backdoor component of this Trojan. Anti-malware products identify and remove the DarkKomet Ransomware as a variant of the DarkComet Rat predominantly.

Depending on what you see when Trojans attack your computer has limitations and even may cause you to take actions to the detriment of your future security. Never take it for granted that not every form of threatening software limits its payload to what's visible, as multi-purpose threats like the DarkKomet Ransomware so well demonstrate.

Related Posts

Loading...