Home Malware Programs Ransomware DCry Ransomware

DCry Ransomware

Posted: July 10, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 63
First Seen: July 10, 2017
OS(es) Affected: Windows

The DCry Ransomware is a Trojan that locks your files by encrypting them and then asks you to contact a threat actor's e-mail address for help, which, usually, is offered at the cost of a cryptocurrency ransom. Buying a decryption service often has drawbacks to the victims trying to restore their files, and local backups also may be affected, making non-local backups the best protection they can give their data. Because this threat has no self-distributing features, it may be related to the presence of other Trojans, and users always should uninstall the DCry Ransomware with thorough anti-malware scans.

One Trojan Advertises for Another One Inadvertently

Once a particular brand in the threat industry achieves any newsworthy success, numerous imitators and derivatives often follow it. However, while these threats may use the same name as the prior one, they often aren't related except in the sense of showing the same, superficial symptoms. For instance, one of the families more subject to being copied of late, the WannaCryptor Ransomware, now is having its name 'borrowed' by the DCry Ransomware, which doesn't seem to be a direct descendant of that Trojan.

Evidence of the DCry Ransomware's real family, if any, has yet to be verified through malware researchers, who, however, do note that the Trojan includes the Shadow Copy-erasing features similar to Hidden Tear and ransom notes reminiscent of many, other campaigns. The DCry Ransomware's main feature remains the ability to target and encrypt files using a custom algorithm, locking the user from opening content such as documents or pictures effectively. It also adds '.dcry' extensions to all blocked media names.

Unlike most Trojans using data-ransoming attacks, the DCry Ransomware uses TOR-based C&C features without tying any of this functionality into the payment process. Its text messages ask for nothing more than the reader to contact the threat actor's e-mail for decryption assistance, to give them room to consider variable prices or transaction methods possibly. Readers might remember the Batman_good@aol.com Ransomware using similar methods to take its money without giving back a file-unlocking solution.

Keeping Cheap Copies of Trojans from Posing Authentic Problems

While the DCry Ransomware may not be a direct relation of WannaCryptor Ransomware or the '.wcry File Extension' Ransomware, this absence of family ties doesn't make the Trojan much less threatening than the ones whose brand it borrows for recognition. The DCry Ransomware removes default, Windows-based backups while locking your files and also may include network-accessible drives in any encryption attacks. To eliminate the risk of this Trojan having any access to your digital content, malware experts recommend saving backups to protected cloud services or storage devices that you keep unattached when not in use.

The installation exploits the DCry Ransomware's campaign is using are in analysis, although some combination of spam e-mails and corrupted website content (like the RIG Exploit Kit) are probably the current infection vectors. You can protect your browser from Trojan-downloading threats of these types by blocking scripts, avoiding opening suspicious documents, and letting your anti-malware products detect corrupted URLs and drive-by-download attempts automatically. If active, the latter should remove the DCry Ransomware before it can lock your files.

The DCry Ransomware is part of a long string of efforts by various con artists to copy the success of a Trojan family without having the code to make any real variants. What's in a name often has little to no bearing on the reality of a particular Trojan, which affects which decryption solutions are compatible with your imprisoned media.

Related Posts

Loading...