Cybersecurity researchers report that a new ransomware threat called Dapo Ransomware has been discovered. Like other similar malware threats, Dapo works by encrypting files on the victim's computer after it infects the system. This ransomware modifies the original filenames by appending the '.dapo' extension to them. For example, a file named '1.pdf' would become '1.pdf.dapo', while '2.doc' would be renamed to '2.doc.dapo', and so on. Along with file encryption, Dapo also generates a ransom note in the form of a text file named '_readme.txt' on the compromised device.
In addition, it is worth noting that Dapo Ransomware is part of the Djvu family of ransomware. This implies that other malicious software threats may have been installed on the breached devices. In fact, operators of STOP/Djvu variants have been observed to deploy information stealers, such as RedLine and Vidar, on infected systems as well.
Dapo Ransomware's Victims Lose Access to Their Data
After analyzing the ransom note left by the attackers, it is evident that victims who wish to regain access to their encrypted files are required to pay for a decryption program and a unique key. The note mentions that victims have a limited time to avail themselves of a discounted rate of $490 if they email the attackers within 72 hours. However, if victims fail to do so, they will have to pay the full amount of $980.
The ransom note also includes two email addresses, 'firstname.lastname@example.org' and 'email@example.com,' which victims can use to contact the attackers. The victims are urged to use these email addresses to communicate with the attackers and arrange for payment and decryption.
It is essential to note that attempting to restore encrypted files without the decryption tools from the attackers is uncommon. Therefore, paying the ransom is not recommended as there is no guarantee that the attackers will provide the decryption tools, even after receiving payment.
Don't Neglect the Security of Your Devices and Data
Ransomware is a type of malicious threat that encrypts a victim's files, rendering them inaccessible, and demands a ransom in exchange for probiding the necessary decryption key. As such, users must take appropriate measures to protect their devices and data from ransomware attacks.
One of the essential steps that users can take is to stay vigilant and be cautious while browsing the internet. This includes avoiding clicking on suspicious links, downloading attachments from unknown sources, and refraining from visiting suspicious websites. Users must also keep their operating system and security software up-to-date to ensure that they have the latest security patches and protection against the latest ransomware variants.
Another critical measure is to ensure that important data is regularly backed up and stored securely, preferably offline or in the cloud. This ensures that even if a ransomware attack occurs, users can still access their important data and not have to pay a ransom.
Additionally, users should educate themselves about ransomware and its various forms of attack, as well as be aware of the signs and symptoms of an attack. They should also be familiar with the steps to take if an attack occurs, such as disconnecting from the internet, reporting the incident, and seeking help from cybersecurity experts.
In summary, to protect against ransomware attacks, users should stay vigilant and cautious, keep their devices and software updated, regularly backup their data, educate themselves about ransomware, and know what to do if an attack occurs. By taking these measures, users can significantly reduce their risk of falling victim to a ransomware attack.
The full text of Dapo Ransomware's note is:
Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.
To get this software you need write on our e-mail:
Reserve e-mail address to contact us:
Your personal ID: