Threat Database Ransomware Diamond Computer Encryption Ransomware

Diamond Computer Encryption Ransomware

By GoldSparrow in Ransomware

The Diamond Computer Encryption Ransomware is a ransomware Trojan that is based on Hidden Tear, an open source ransomware platform that has been the base for countless encryption ransomware Trojans in the last two years. Like other Hidden Tear variants, the Diamond Computer Encryption Ransomware uses the AES encryption to make the victim's files inaccessible. The Diamond Computer Encryption Ransomware will mark the files encrypted by the attack by adding an extension made up of six random characters to the end of the file's name. The Diamond Computer Encryption Ransomware delivers a ransom note in the form of an HTML file, which is dropped into each directory where the Diamond Computer Encryption Ransomware has encrypted data. This HTML file is named '_READ_IT_FOR_RECOVER_FILES.html' and contains information about the attack and how to recover the affected files.

How the Diamond Computer Encryption Ransomware Attack Works

Like most ransomware Trojans, the Diamond Computer Encryption Ransomware works by demanding a ransom, taking the victim's files hostage and then extorting the victim until a large amount of money is transferred. In its HTML file, the Diamond Computer Encryption Ransomware demands payment of .1 Bitcoin (approximately $350 at the current exchange rate). Once the Diamond Computer Encryption Ransomware has encrypted files, it is not possible to restore them with the current technology. Because of this, the only way for the victims to recover the affected data is by deleting the infected files and erasing them with backup copies. It is not a good idea to pay the Diamond Computer Encryption Ransomware ransom. There are several reasons for this:

  1. Paying the Diamond Computer Encryption Ransomware ransom allows the con artists to continue developing and creating ransomware Trojans like the Diamond Computer Encryption Ransomware, claiming new victims and attacking more computers.
  2. Victims that have paid these ransoms have reported that the con artists may ignore them or demand even more money.
  3. In cases where victims regained access to their files, it is common that they will be targeted for further attacks since they have already demonstrated a willingness to pay the ransom amount.

The following is the ransom note used by the Diamond Computer Encryption Ransomware:

'Diamond Computer Encryption
What Happened to My Computer?
Your important files are encrypted.
Many of your documents, photos, videos, databases and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without the decryption key.
Can I recover my files?
Sure. We guarantee that you can recover all your files safely and easily you only need is pay 0.1 bitcoins (Approximate value in dollars U$$ 300)
How do I Pay?
Payment is accepted in Bitcoin only.
You buy bitcoins in hxxp://localbitcoin.com or put on google search on your country buy bitcoin and you verify the locations for buy Bitcoins in your location.
After the payment confirmed all your files is decrypted automatically and you recover all your files are encrypted now. The address for make the payment is 1L6PpSehR8V7YsZTc3L3F5RwbWoNma1nno
For automatic recover all your files send 0.1 bitcoin to 1L6PpSehR8V7YsZTc3L3F5RwbWoNma1nno'

How the Diamond Computer Encryption Ransomware Spreads

Ransomware Trojans like the Diamond Computer Encryption Ransomware are usually spread is through the use of corrupted spam email attachments. Victims of the attack will receive an email message containing an attached Microsoft Word file. This file will use corrupted macro scripts to download and install the Diamond Computer Encryption Ransomware unto the victim's computer. Taking steps to protect your computer from threats with a security program and ensuring that you know how to recognize and deal with spam email messages are essential in stopping infections like the Diamond Computer Encryption Ransomware. To combat ransomware infections, you should have backups of your files, which allow you to restore them in the event of an attack.

Trending

Most Viewed

Loading...