DDOS Ransomware Description
Another spinoff of the Crysis/Dharma family of ransomware has been spotted by security researchers. The new variant is called the DDOS Ransomware, for lack of a better name. Despite the abbreviation used, the ransomware has nothing to do with a Distributed Denial of Service or DDoS. It is a garden variety file encryption threat that scrambles valuable data and dumps a ransom note on the victim's machine. The name comes from the extension that the ransomware appends to encrypted files.
There are no significant differences between this new fork of the Crysis/Dharma Ransomware, but this is largely the case with all variants, as the different groups of bad actors simply redistribute the ransomware with a new ransom demand email. The DDOS Ransomware uses the email address "decripted at cock.li" as its point of contact with victims. There is no specific ransom demand listed in the ransom note - those affected by the DDOS Ransomware are expected to contact the bad actors using this email and receive a personalized ransom demand.
Currently, there is no decryption tool for the DDOS Ransomware. The most reliable defenses against it, as well as against other crypto-threats, are regular backups to external devices and installing a reliable anti-malware suite that can stop the ransomware executable in its tracks before it can cause harm.
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to DDOS Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.