{"id":1171,"date":"2017-05-31T10:02:22","date_gmt":"2017-05-31T10:02:22","guid":{"rendered":"https:\/\/www.technology-solved.com\/huntsville-al\/?p=1171"},"modified":"2022-02-02T21:31:03","modified_gmt":"2022-02-02T21:31:03","slug":"stolen-version-dma-locker-making-rounds","status":"publish","type":"post","link":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/","title":{"rendered":"A stolen version of DMA Locker is making the rounds"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1172\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2019\/04\/new_dma_lock.png\" alt=\"DMA Locker\" width=\"300\" height=\"222\" \/><\/p>\n<p>Posted: May 29, 2017 by Malwarebytes Labs<br \/>\nLast updated: May 30, 2017<\/p>\n<p>Ransomware has become a popular criminal business with a relatively easy entrance. Even the people with little technical knowledge can build their own ransomware-based on open source code, that has been published on the internet some time ago. Nevertheless, cybercriminals keep stealing, not only from victims but also from each other. Some time ago we heard about PetrWrap \u2013 a ransomware built upon a binary of the infamous Petya. But that is not the only case. For some time, we have been observing a threat actor who distributes patched DMA Locker binaries.<\/p>\n<p>Real or stolen DMA Locker \u2013 why would you care?<\/p>\n<p>The observed samples of the stolen version of DMA Locker have been built based on one and the same instance of DMA Locker \u2013 so, they carry inside the same public key. This implies, that all the victims of this version can get their data back with the help of the same private key. And now comes the best part: we have this key and we distribute it for free to all affected persons.<\/p>\n<p>If you are a victim of the fake DMA Locker, you can send e-mail with samples of you encrypted files to: hasherezade-at-gmail.com<\/p>\n<p>How to recognize the stolen versions?<\/p>\n<p>Since the fake DMA Locker is based on the binary of the original DMA Locker 3.0, they have exactly the same GUI \u2013 only the keywords referring to DMA Locker has been removed:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1173\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2019\/04\/new_dma_lock.png\" alt=\"DMA Locker\" width=\"300\" height=\"221\" \/><\/p>\n<p>The main difference between the original and stolen DMA Locker is a different marker at the beginning of the encrypted file. While the real DMA Locker prefixes content with: !DMALOCK, the stolen version have many different prefix patterns. Some we have observed are:<\/p>\n<p>!XPTLOCK5.0<br \/>\n!Locked#2.0<br \/>\n!Locked!###<br \/>\n!Encrypt!##<br \/>\nHowever, the threat actor changes them periodically \u2013 so, anything that is different from the standard pattern may suggest that we are dealing with the \u201cpirated\u201d, decryptable version.<\/p>\n<p>An example of the file encrypted by the fake DMA Locker:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1175\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png\" alt=\"encrypted file\" width=\"300\" height=\"102\" \/><\/p>\n<p>What are the chances to get the data back?<\/p>\n<p>Up to now, we managed to help 100% of the known victims of the fake DMA Locker. So far, the threat actor responsible for distributing it has not changed the key \u2013 so, the prospects of getting data back are still big. However, the chance to get help drastically shrink in case you were attacked with the legitimate DMA Locker, which may look the same at first sight.<\/p>\n<p>How to prevent the attack?<\/p>\n<p>Distributors of the fake (as well as the original) DMA Locker enter the victim machine via hacked Remote Desktop. Thus, we recommend paying attention if you have Remote Desktop open and if so, if it is properly secured.<\/p>\n<p>Analyzed sample<\/p>\n<p><a href=\"https:\/\/hybrid-analysis.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/hybrid-analysis.com\/<\/a> \u2013 fake DMA Locker, adding \u201c!Encrypt!##\u201d prefix.<\/p>\n<p>Appendix<\/p>\n<p>Currently in distribution is version 3.0 of DMALocker, since the development of 4.0 was abandoned. Read more about our research:<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Posted: May 29, 2017 by Malwarebytes Labs Last updated: May 30, 2017 Ransomware has become a popular criminal business with a relatively easy entrance. Even the people with little technical knowledge can build their own ransomware-based on open source code, that has been published on the internet some time ago. Nevertheless, cybercriminals keep stealing, not [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":1872,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A stolen version of DMA Locker is making the rounds - Computer Troubleshooters Huntsville<\/title>\n<meta name=\"description\" content=\"Posted: May 29, 2017 by Malwarebytes Labs Last updated: May 30, 2017 Ransomware has become a popular criminal business with a relatively easy entrance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A stolen version of DMA Locker is making the rounds - Computer Troubleshooters Huntsville\" \/>\n<meta property=\"og:description\" content=\"Posted: May 29, 2017 by Malwarebytes Labs Last updated: May 30, 2017 Ransomware has become a popular criminal business with a relatively easy entrance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Troubleshooters Huntsville\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-31T10:02:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-02T21:31:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png\" \/>\n\t<meta property=\"og:image:width\" content=\"631\" \/>\n\t<meta property=\"og:image:height\" content=\"215\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cthuntsville\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cthuntsville\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/\",\"name\":\"A stolen version of DMA Locker is making the rounds - Computer Troubleshooters Huntsville\",\"isPartOf\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png\",\"datePublished\":\"2017-05-31T10:02:22+00:00\",\"dateModified\":\"2022-02-02T21:31:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90\"},\"description\":\"Posted: May 29, 2017 by Malwarebytes Labs Last updated: May 30, 2017 Ransomware has become a popular criminal business with a relatively easy entrance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#primaryimage\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png\",\"contentUrl\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png\",\"width\":631,\"height\":215,\"caption\":\"encrypted file\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Locations\",\"item\":\"https:\/\/www.technology-solved.com\/locations\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alabama\",\"item\":\"https:\/\/www.technology-solved.com\/alabama-state\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Homepage\",\"item\":\"https:\/\/www.technology-solved.com\/huntsville-al\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"A stolen version of DMA Locker is making the rounds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#website\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/\",\"name\":\"Computer Troubleshooters Huntsville\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.technology-solved.com\/huntsville-al\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90\",\"name\":\"cthuntsville\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"caption\":\"cthuntsville\"},\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/author\/cthuntsville\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A stolen version of DMA Locker is making the rounds - Computer Troubleshooters Huntsville","description":"Posted: May 29, 2017 by Malwarebytes Labs Last updated: May 30, 2017 Ransomware has become a popular criminal business with a relatively easy entrance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/","og_locale":"en_US","og_type":"article","og_title":"A stolen version of DMA Locker is making the rounds - Computer Troubleshooters Huntsville","og_description":"Posted: May 29, 2017 by Malwarebytes Labs Last updated: May 30, 2017 Ransomware has become a popular criminal business with a relatively easy entrance.","og_url":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/","og_site_name":"Computer Troubleshooters Huntsville","article_published_time":"2017-05-31T10:02:22+00:00","article_modified_time":"2022-02-02T21:31:03+00:00","og_image":[{"width":631,"height":215,"url":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png","type":"image\/png"}],"author":"cthuntsville","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cthuntsville","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/","url":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/","name":"A stolen version of DMA Locker is making the rounds - Computer Troubleshooters Huntsville","isPartOf":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#primaryimage"},"image":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png","datePublished":"2017-05-31T10:02:22+00:00","dateModified":"2022-02-02T21:31:03+00:00","author":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90"},"description":"Posted: May 29, 2017 by Malwarebytes Labs Last updated: May 30, 2017 Ransomware has become a popular criminal business with a relatively easy entrance.","breadcrumb":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#primaryimage","url":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png","contentUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2017\/05\/prefix.png","width":631,"height":215,"caption":"encrypted file"},{"@type":"BreadcrumbList","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/stolen-version-dma-locker-making-rounds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Locations","item":"https:\/\/www.technology-solved.com\/locations\/"},{"@type":"ListItem","position":2,"name":"Alabama","item":"https:\/\/www.technology-solved.com\/alabama-state\/"},{"@type":"ListItem","position":3,"name":"Homepage","item":"https:\/\/www.technology-solved.com\/huntsville-al\/"},{"@type":"ListItem","position":4,"name":"A stolen version of DMA Locker is making the rounds"}]},{"@type":"WebSite","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website","url":"https:\/\/www.technology-solved.com\/huntsville-al\/","name":"Computer Troubleshooters Huntsville","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technology-solved.com\/huntsville-al\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90","name":"cthuntsville","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","caption":"cthuntsville"},"url":"https:\/\/www.technology-solved.com\/huntsville-al\/author\/cthuntsville\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/comments?post=1171"}],"version-history":[{"count":5,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1171\/revisions"}],"predecessor-version":[{"id":2382,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1171\/revisions\/2382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media\/1872"}],"wp:attachment":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media?parent=1171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/categories?post=1171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/tags?post=1171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}