New Malware Called Damage Ransomware Spreads Online
Damage Ransomware is a file-encrypting ransomware virus that was reported by the cyber security analysts on 22nd February 2017. The malware is named just after the suffix “.damage” which it adds onto the encrypted file name. Initial analysis on this threat confirmed that it is a standalone project and doesn’t belongs to any notable family of the file coders. This ransomware only supports English and it may be installed onto the targeted machine through macro-enabled documents. Although, it is a very long-standing practice among the malware developers in order to abuse the macro functionality into the word processors and PDF readers, which allow them to install a nasty virus like Damage Ransomware remotely. Besides, the challenge is to lure the computer user to enable the macro on corrupted document. In most of the cases, virus creators use logos from the trusted companies to convince the system users that it is a foreign file which is safe to open.
How Could You Get Infected with Damage Ransomware?
Therefore, it is needless to say that PC users who unable to recognize the spam email messages and load the documents featuring a malicious micro script may fall the victims to Damage Ransomware. This malware is equipped with custom-built RSA-2048 and AES-256 ciphers, that are just as effective as other versions used by infamous ransomware viruses. In this ransomware, the AES-256 cipher is used to encrypt the content of data containers that are associated with musics, videos, presentations, photos, databases, spreadsheets and the media content creation. However, it is quite safe to say that the ransomware is likely to encipher user-generated databases and content that are used by the applications like Mandriva and SQLite.
As mentioned in the above para, Damage Ransomware threat adds “.damage” file extension onto encrypted objects and the “Cute_babby.jpeg” will be transcoded to “Cute_baby.jpeg.damage”. Moreover, the system users that experience the ransomware attack may find a new .txt document ontop their desktops which appears as “[email protected][PC_NAME].txt”. This text file is generated by the malware when the encryption procedure is completed. Unluckily, the encryption algorithm followed by this ransomware is very secure and the decryption is quite impossible without an appropriate program or a correct decryption key. However, the computer users that are not willing to pay the demanded ransom money discouraged, though. Recovery disks, archives and the backup images should help you to restore files just after you remove Damage Ransomware safely from your PC.
Experts explain that Damage Ransomware is only the outcome of destructive minded people’s exploration to create a means for monetizing themselves. Therefore it is needless to say that if any victimized user think to pay according to published ransom note then it would be only the wastage of money. In place of that users must backup their all important files and data to maintain these in safe condition. And also they should prefer the use of reliable anti malware tools to remove Damage Ransomware and to prevent PC from future attack.
Follow Steps to Delete Damage Ransomware from PC
STEP I: How to Start PC in Safe Mode with Network
In order to isolate files and entries created by Damage Ransomware, users need to follow the below mentioned steps.
- Select WIN Key + R in Combination
2. This will open a Run Window, Now Type “msconfig” and hit on Enter.
3. Now a Configuration box will appear. Now select the Tab named as “Boot”
4. Click and mark “Safe Boot” option >> go to “Network”
5. In order to Apply the settings, Select on OK
Step B: How to Restore System During Damage Ransomware Attack
Still, if you are facing problem in rebooting PC in Safe mode, opt for System Restore. Follow the steps given below.
Prss F8 continously until you get Windows Advanced Options Menu on Computer Monitor. Now Choose Safe Mode with Command Prompt Option and Tap enter
In the Command Prompt Windows, you need to type this command : cd restore and Select Enter
Now type rstrui.exe as command and press on Enter
This will open a new window to Restore System Files and Settings. Click on Next to proceed.
Restore Point is to be selected from the date you want to restore back your system as it was earlier to Damage Ransomware attack
Step C Another method for recovering your decrypted files are file recovery software
If above methods are not successful you can go for file recovery software. It can be helpful in recovering your encrypted files as Damage Ransomware first makes a copy of original files and then encrypt it. After encryption it deletes the original files. So there is high probability that these file recovery software can help you in recovering your original files.
Step: D Know How to Restore Shadow Copies of Encrypted Data
In certain cases, if Damage Ransomware has not deleted the Shadow Copies of the data then it can be easily restored using ShadowExplorer. (Know how to install and use ShadowExplorer)