Threat Database Ransomware DMR Ransomware

DMR Ransomware

Despite the best efforts of anti-virus vendors, the success of ransomware continues to grow with each passing month. 2019 has been marked by harmful attacks of major ransomware families like the STOP and the Dharma, but there are also numerous smaller projects that should not be underestimated. One of those is the DMR Ransomware, a file-encryption Trojan that was spotted for the first time in December. This project is unlikely to be related to any of the previously known ransomware families, and, unfortunately, it also seems to use a flawless file-encryption algorithm that is impossible to crack or decipher. This means that once the DMR Ransomware encrypts a file, its recovery might not be possible unless the ransomware's operators release the unique decryption key used during the attack.

Of course, the operators of the DMR Ransomware will not supply this key piece of information for free – they want to be compensated via Bitcoin in exchange for their assistance. Although they do not specify the exact price, you can rest assured that acquiring their services will not cost you anything less than at least a few hundred dollars. The fact that the payment is to be made via Bitcoin means that it would be impossible for the sender to track or cancel the transaction – this would make it very easy for the DMR Ransomware's authors to trick their victims.

Once the DMR Ransomware is initialized on an unprotected computer, it will start a threatening file-encryption attack whose ultimate goal is to render the victim's important files inaccessible – documents, images, archives, spreadsheets, text files, and videos are just some of the file types that the DMR Ransomware goes after. Whenever a file is encrypted, the ransomware will add the extension '%.DMR64' to its name. Another change brought by the DMR Ransomware is the creation of the file '!!! READ THIS !!!.hta,' which explains the attack to the victims, and tells them what they need to do to recover their data. The attackers list the emails agent.dmr@aol.com and agent.dmr@protonmail.com for contact, but we would not advise you to try to cooperate with them.

Since working with the perpetrators is risky, and there is no free decryption option available, victims of the DMR Ransomware may need to experiment with alternative data recovery methods. Do not forget that before you attempt to unlock any of your files, you should make sure to eradicate the DMR Ransomware components with the help of a trustworthy and updated anti-virus engine.

Related Posts

Trending

Most Viewed

Loading...