Home Malware Programs Ransomware Domino Ransomware

Domino Ransomware

Posted: August 29, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 1,134
First Seen: August 29, 2016
Last Seen: December 9, 2020
OS(es) Affected: Windows

The Domino Ransomware is a Trojan that uses code based on the Hidden Tear resources for encrypting your files. While the Domino Ransomware threatens to erase the encrypted data after a short deadline, PC users can enact a full recovery from its attacks once the Trojan is removed or disabled. Deleting the Domino Ransomware should use anti-malware products able to identify any other threats that may come with it.

Trojans Taking Down Your Data Like a Row of Dominoes

New versions of Trojans based on old families sometimes bear evidence of the personality quirks of their threat actors along with slight differences in attack methodology. The social engineering strategies in use by file encryption Trojans are one area where malware experts see these differences most visibly. Some threat campaigns, such as that of the Hidden Tear variant of the Domino Ransomware, include both threats pairing themselves with whimsical media references.

The only installer malware experts can confirm for the Domino Ransomware is a specially modified installation executable for KMSpico, a tool for pirating the Microsoft software. Besides running KMSpico, this modified file also infects the computer with the Domino Ransomware, which scans the hard drive for over two hundred types of data. Data types include tax information databases, text documents, images and movies. Appropriate content is encrypted with an AES algorithm and appended with the '.the Domino' extension (which does not erase the rest of the name or any original extension tags).

The Domino Ransomware's ransom message references basic programming tutorials with its 'Hello World' title, includes a prominent adage from Game of Thrones, and even uses an ASCII cow instead of a signature. These whimsical details contrast with the Domino Ransomware's extortion demands, which consist of one Bitcoin to be paid within seventy-two hours before the Trojan deletes your encrypted data.

Putting an Extortionist Cow out to Pasture

The Domino Ransomware's preferred installation exploit raises the point of the perpetual risks around using software piracy as an alternative to purchasing the genuine product. Users of illegal 'cracks' like KMSpico put their PCs at risk for encryption attacks like the Domino Ransomware's payload, as well as other dangers, including backdoor-based remote control or a loss of information by spyware. For those who do insist on downloading any files that may be compromised, taking a moment to scan the content with anti-malware tools usually should identify a Trojan installer before the Domino Ransomware can attack.

Another, equally important lesson can be found in researching more into the Domino Ransomware's origins. Although it's not true of all Trojan families, the Hidden Tear does have working decryption options available to the public. Once your anti-malware tools remove the Domino Ransomware, you can recover your files at no charge while taking as much time as you require.

Very often, partaking in illicit Web-surfing habits and exposing your computer to threatening software go hand-in-hand. Although the Domino Ransomware is a happy case of a Trojan whose attacks are reversible, not all threat actors are as easy to thwart.

Loading...