Home Malware Programs Ransomware Dungeon Ransomware

Dungeon Ransomware

Posted: June 18, 2020

The Dungeon Ransomware is a file-locking Trojan that's from the Xorist Ransomware family. The Dungeon Ransomware can block media on your computer with encryption and hold it for an undisclosed Bitcoin ransom. Users should depend on backup solutions for protecting their work from permanent harm while letting their anti-malware services block or uninstall the Dungeon Ransomware.

An Unjust Prison for Your Data

Imprisoning information has fewer logistical hurdles than doing the same for flesh and blood, and criminals take advantage of the fact daily. While some of them opt for renting Ransomware-as-a-Service families, others use freeware, like Hidden Tear, or the Xorist Ransomware's kit. The last of these options is responsible for a new campaign with the Dungeon Ransomware's appropriately-ominous name.

Campaigns from the Dungeon Ransomware's family include similarly-recent ones like the ZoNiSoNaL Ransomware and the GlUTe Ransomware, along with older examples such as the TaRoNiS Ransomware or the Vulston Ransomware. The Dungeon Ransomware's campaign seems wholly independent, as its payload suggests with both a different ransom note and a new style of extension on the 'imprisoned' files' names. The Trojan's '([dungeon]-0_0)' extension also is a rare example of a file-locking Trojan using an emoticon and is uncharacteristic of the industry.

The Dungeon Ransomware continues using thee Xorist Ransomware XOR or TEA (at the threat actor's preference) encryption as a way of locking media, with documents and music and other, high-use formats being at high risk. The Dungeon Ransomware generates a TXT file with a ransom demand in grammatically-poor English when it completes its attack. Although the Dungeon Ransomware doesn't specify an amount, it does provide a twenty-four-hour deadline, for pressuring victims.

An Affordable Breakout Plan for Digital Media

The use of a China-based e-mail address implies that the Dungeon Ransomware's campaign targets Asian victims in Windows environments. Despite this detail, the Xorist Ransomware family is a danger to users around the world if they lack backup, particularly. Backing up content like documents to detachable drives or protected cloud services helps users avoid the extortionist hostage scenario of the Dungeon Ransomware's attacks, whether or not they dodge infection.

In worst cases, there is a free decryption utility for the Dungeon Ransomware's family. Malware researchers recommend copying files for compatibility-checking purposes before using any decryptor.

Victims also should avoid using simple passwords, downloading illicit media or updating their software from unofficial links. These habits, along with workers exposing their PCs through e-mail attachments, are responsible for most file-locking Trojans' infections.

On average, professional anti-malware programs will detect the variants of the Xorist Ransomware.

The Dungeon Ransomware is a less professional, more playful showing of a Trojan category that's so-often standardized into a rote, boring business model. That doesn't mean its actions are less hostile necessarily – and the question of its ransom cost remains unanswered.

Loading...