Threat Database Ransomware Damoclis Ransomware

Damoclis Ransomware

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 724
First Seen: November 1, 2017
Last Seen: June 14, 2023
OS(es) Affected: Windows

The Damoclis Ransomware is an encryption ransomware Trojan that is part of a group of encryption ransomware Trojans released in late October and early November 2017. Complains related to the Damoclis Ransomware first started appearing on November 1, 2017, as part of a wave of ransomware attacks from related ransomware. It is very likely that the Damoclis Ransomware is part of a RaaS (Ransomware as a Service) tactic that may include several encryption ransomware variants. The Damoclis Ransomware, like many other encryption ransomware Trojans, is probably being delivered to victims through spam email messages that include corrupted file attachments with macro scripts that download and install the Damoclis Ransomware on the victim's computer.

The Damoclis Ransomware Attack and Its Consequences

The Damoclis Ransomware is designed to encrypt the victim's files using a strong encryption algorithm. These infections are designed to encrypt the user-generated files, such as photos, documents, configuration files, databases, etc. while avoiding the Windows system files. This is because the Damoclis Ransomware and similar threats need Windows to remain functional so that they can demand a ransom payment from the victim. The examples of some of the file types that are targeted in a Damoclis Ransomware infection include:

.3gp, .7z, .apk, .avi, .bmp, .cdr, .cer, .chm, .conf, .css, .csv, .dat, .db, .dbf, .djvu, .dbx, .docm, ,doc, .epub, .docx .fb2, .flv, .gif, .gz, .iso .ibooks,.jpeg, .jpg, .key, .mdb .md2, .mdf, .mht, .mobi .mhtm, .mkv, .mov, .mp3, .mp4, .mpg .mpeg, .pict, .pdf, .pps, .pkg, .png, .ppt .pptx, .ppsx, .psd, .rar, .rtf, .scr, .swf, .sav, .tiff, .tif, .tbl, .torrent, .txt, .vsd, .wmv, .xls, .xlsx, .xps, .xml, .ckp, .zip, .java, .py, .asm, .c, .cpp, .cs, .js, .php, .dacpac, .rbw, .rb, .mrg, .dcx, .db3, .sql, .sqlite3, .sqlite, .sqlitedb, .psd, .psp, .pdb, .dxf, .dwg, .drw, .casb, .ccp, .cal, .cmx, .cr2.

The Damoclis Ransomware will mark the files encrypted by its attack with the file extension '.damoclis' added to the end of each of the infected files' names. Once the Damoclis Ransomware is done with the encryption of the files, they will no longer be readable by the victim's software or recognized by the Windows Explorer. The Damoclis Ransomware communicates with its Command and Control server to receive configuration information, relay information about the infected computer, and prevent the victim and PC security researchers from having access to a decryption key since it is impossible to restore the affected files without it. The Damoclis Ransomware takes the victim's files hostage effectively, making the files inaccessible and then demands a ransom payment from the victim to deliver the tool necessary to restore the affected files. Unfortunately, once the Damoclis Ransomware encrypts a file, it can no longer be accessed without the decryption key (which the crooks hold in their possession).

How the Damoclis Ransomware Demands a Ransom from the Victim

The Damoclis Ransomware drops a ransom note on the infected PC's desktop once the victim's files are encrypted. This ransom note, named 'HOWTODECRYPTFILES.html,' contains a message demanding the payment of a ransom through Bitcoins. The ransoms demanded by threats like the Damoclis Ransomware range from several hundred US dollars to thousands of US dollars paid through an anonymous online payment method like Bitcoin. However, it is not a common practice the con artists behind a ransomware tactic to deliver the means to decrypt the victims' files so that it may be a waste of time and money to pay the ransom or communicating with these people in any way.

Preventing a Damoclis Ransomware Attack

To protect your machine against ransomware Trojans like the Damoclis Ransomware you need to have file backups in safe places. Having copies of your files means that you can recover from the Damoclis Ransomware attack by recovering the affected files from the backup copy rather than having to deal with the people responsible for the attack. Apart from file backups, an updated security product is fundamental to keep your data safe. It is also practical to learn to handle spam email messages safely.

Trending

Most Viewed

Loading...