Decrypt THIS! Ransomware dev taunts security researchers in support forum

DXXD doesn't display a ransom note like other ransomware...

Dxxd ransomware

A ransomware developer taunted security researchers in a tech support forum by egging them on to decrypt the newest version of their malware.

News of the DXXD ransomware first emerged in a forum post from Michael Gillespie, a security researcher who has spotted and developed decryption tools for numerous examples of crypto malware.

Ransomware messa

There’s nothing particularly interesting about the DXXD ransomware. When it encrypts a victim’s files, it appends dxxd to each affected filename.

That goes for files that DXXD finds on a target computer as well as network shares.

Encrypted files

Source: Bleeping Computer

What is interesting, however, is the way the ransomware displays its ransom note.

As noted by Lawrence Abrams, a computer security expert at Bleeping Computer:

This ransomware… also configures a Windows Registry setting that is used to display a legal notice when people log into a computer. By configuring these registry keys, the ransomware developer knows that any a user who tries to login to the server will see the ransom note.”

Specifically, the ransomware changes the registry values:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption and HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText.

Doing so makes sure each and every user will see the ransom note before they log into their account.

Legal notice

Source: Bleeping Computer

Microsoft Windows Security Center. Dear Administrator, YOUR server is attacked by hackers. For more infromations and recommendations, write to our experts by e-mail

After receiving word of DXXD, Gillespie created a decryption tool for the ransomware that allowed victims to restore access to their files for free.

Unfortunately, the ransomware developer cut the life of that utility short by modifying DXXD’s code.

But they didn’t stop there.

Determined to have the last word, the author posted on Bleeping Computer and egged Gillespie and others to decrypt the ransomware’s newest version.

Dxxd forum message

Source: Bleeping Computer

hello guys..
how are you?
decrypt a new vesrion??? (its pre alpha vesrion)

The malware developer says that they have made DXXD harder to decrypt by using a zero-day vulnerability affecting Windows computers, something which Abrams thinks the author is using to hack into servers using Remote Desktop Services and brute force passwords.

Users should prepare for a ransomware infection by backing up their critical data on a regular basis. That way, they won’t need to pay the ransom if they suffer an infection. They should also maintain an up-to-date anti-virus solution on their computers and keep their software updated.

There is currently no decryption tool for DXXD. That means all victims should remove the malware from their computers, restore their files using their data backups, and change all passwords saved on their affected machines.

Tags: , ,

Share this article:

   Join thousands of others and sign up to our free "GCHQ" newsletter.

Smashing Security podcast
Check out "Smashing Security", the award-winning weekly audio podcast, with Graham Cluley, Carole Theriault, and special guests from the world of information security.

"It's brilliant!" • "Three people having fun in an industry often focused on bad news" • Winner of the Best Security Podcast 2018

Latest episodes:
Listen on Apple Podcasts Listen on Google Podcasts

, ,

14 Responses

  1. Bob

    October 12, 2016 at 6:41 pm #

    I see they’re using two of the most secure email services at there: ProtonMail and Tutanota.

    The irony.

    • Bob in reply to Bob.

      October 12, 2016 at 6:45 pm #

      I should have added that the following critical patches were released yesterday. Update ASAP.

  2. Elliot Alderson

    October 12, 2016 at 8:34 pm #

    DXXD2 is cracked, go to bleepingcomputer to get updated info about this.

    you’re welcome

    • Bob in reply to Elliot Alderson.

      October 13, 2016 at 12:26 am #

      Not according to your link. Read it carefully.

      Researchers are currently analyzing the sample and looking for weaknesses. If one can be found, a decryptor will be released for free.”

      • Michael Gillespie in reply to Bob.

        October 13, 2016 at 5:20 am #

        It’s decryptable, check my comment. The new decrypter is only being shared in private for now, victims just have to post in the forum for help.

        • ab1201 in reply to Michael Gillespie.

          December 16, 2016 at 6:51 pm #

          I need the latest decryption tool!

          • David Bisson in reply to ab1201.

            December 16, 2016 at 7:23 pm #

            Michael Gillespie published a decrypter on Bleeping Computer. It looks like it covers only early versions, but you can try it anyway. You can find a link for it here:


            Hope it works out for you! If not, contact Michael and see if he can help you any further.

          • Michael Gillespie in reply to David Bisson.

            December 17, 2016 at 7:08 am #

            I wrote a separate decrypter for the second variant of DXXD. It is now publicly released, try the DXXD2Decrypter:

            This person may have already posted in that topic (and other topics on BC and PM’d me), and we have not confirmed if it is really DXXD they are dealing with. They have files with the extension .aes256, and we have no proof of a connection yet (or sample of the malware).

  3. kmjnhbgvfcd

    October 12, 2016 at 9:22 pm #

    Stupid fuckin’ russians, insecure as all fuck, and trying to impress someone with his kiddie-script coding skills!

    Oh my god, look at me! Look at the really, really good code that I wrote, all by myself too!” the loser screams.

    He learned by hacking into gay porn sites.

    Likes it up the ass, you see.

    With the big crazy $300 that encryption will make him, perhaps he can buy a little russian boyfriend.

    Ya think?

    • coyote in reply to kmjnhbgvfcd.

      October 13, 2016 at 2:38 am #

      Russians? Last I knew .de was Germany (if you knew anything about German or even had any idea about country codes, you might be able to put that together..might being keyword). The location stated on his profile suggests Iceland.

      Charming display of racism and bigotry.


    October 13, 2016 at 2:18 am #

    So the script Kiddies are at it again, huh!??! Poor selfish little snots. Boo hooo I have no life so I must create a malware to hurt people! Get a life you Newbs! Anyone who gets infected deserved to be infect, Know what not to open. If you don’t know, then STAY OFF THE INTERNET!!!!!!

  5. IT Rockstars

    October 18, 2016 at 11:36 am #

    Suprised that he posted in the forum - that’s just asking for trouble.

    • M.Cihan Erdem in reply to IT Rockstars.

      November 5, 2016 at 7:15 pm #

      hi, anyone knows solution for xtbl, cerber3 and cerber4 ransomwares ?

      • anon mcanon in reply to M.Cihan Erdem.

        November 14, 2016 at 1:11 am #

        You can try this for XTBL: .

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.