Domino Ransomware
Posted: August 29, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 1,134 |
First Seen: | August 29, 2016 |
---|---|
Last Seen: | December 9, 2020 |
OS(es) Affected: | Windows |
The Domino Ransomware is a Trojan that uses code based on the Hidden Tear resources for encrypting your files. While the Domino Ransomware threatens to erase the encrypted data after a short deadline, PC users can enact a full recovery from its attacks once the Trojan is removed or disabled. Deleting the Domino Ransomware should use anti-malware products able to identify any other threats that may come with it.
Trojans Taking Down Your Data Like a Row of Dominoes
New versions of Trojans based on old families sometimes bear evidence of the personality quirks of their threat actors along with slight differences in attack methodology. The social engineering strategies in use by file encryption Trojans are one area where malware experts see these differences most visibly. Some threat campaigns, such as that of the Hidden Tear variant of the Domino Ransomware, include both threats pairing themselves with whimsical media references.
The only installer malware experts can confirm for the Domino Ransomware is a specially modified installation executable for KMSpico, a tool for pirating the Microsoft software. Besides running KMSpico, this modified file also infects the computer with the Domino Ransomware, which scans the hard drive for over two hundred types of data. Data types include tax information databases, text documents, images and movies. Appropriate content is encrypted with an AES algorithm and appended with the '.the Domino' extension (which does not erase the rest of the name or any original extension tags).
The Domino Ransomware's ransom message references basic programming tutorials with its 'Hello World' title, includes a prominent adage from Game of Thrones, and even uses an ASCII cow instead of a signature. These whimsical details contrast with the Domino Ransomware's extortion demands, which consist of one Bitcoin to be paid within seventy-two hours before the Trojan deletes your encrypted data.
Putting an Extortionist Cow out to Pasture
The Domino Ransomware's preferred installation exploit raises the point of the perpetual risks around using software piracy as an alternative to purchasing the genuine product. Users of illegal 'cracks' like KMSpico put their PCs at risk for encryption attacks like the Domino Ransomware's payload, as well as other dangers, including backdoor-based remote control or a loss of information by spyware. For those who do insist on downloading any files that may be compromised, taking a moment to scan the content with anti-malware tools usually should identify a Trojan installer before the Domino Ransomware can attack.
Another, equally important lesson can be found in researching more into the Domino Ransomware's origins. Although it's not true of all Trojan families, the Hidden Tear does have working decryption options available to the public. Once your anti-malware tools remove the Domino Ransomware, you can recover your files at no charge while taking as much time as you require.
Very often, partaking in illicit Web-surfing habits and exposing your computer to threatening software go hand-in-hand. Although the Domino Ransomware is a happy case of a Trojan whose attacks are reversible, not all threat actors are as easy to thwart.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.