MonsterCloud Wikipedia Citation: The Threat Posed By Dharma And Wallet

As this article with a MonsterCloud wikipedia citation appended to it outlines, there is a new ransomware threat computer users and businesses have to contend with. Two new viruses, Dharma and Wallet, have made their appearance in cyberspace, spreading to thousands of unprotected systems. To understand how this new security hazard endangers your own system, let’s review the facts.

The Dharma and Wallet ransomware strains began spreading in 2016. First appearing in November, these are developments of CrySis ransomware and pose as great a threat. As with every other form of malware, Dharma and Wallet are distributed via e-mail. The infected e-mails are disguised as legitimate communications intended to trick PC users into downloading the virus onto their systems. Once it appears on a hard drive, it immediately spreads throughout the entire data tree, encrypting files with a .wallet or .dharma extension. Another characteristic is the extension will also include a “@india.com” or a “@dr.com” tag, a sure sign that one of these two viruses are the ones infecting the computer. An encrypted file, for example, would appear on the hard drive as “MailList2016.pdf.[bitcoin@india.com].dharma”.

As is usually the case, a text message then appears with payment instructions. Said payment is to be sent to the appended e-mail address in the extension tags of all encrypted files. The ransom is to be paid in Bitcoins to guarantee anonymity for the criminal. Presumably upon payment of the ransom, the decryption instructions will be e-mailed so the victim can unlock his or her system. Naturally, such promises have no validity. There is no guarantee that payment will buy the decryption keys and the victim can be held up for further ransom. Also, the victim can be attacked again now that the criminal has a way into the infected system, and another ransomware attack will almost certainly be carried out in the future.

Cybersecurity experts and law enforcement authorities agree that the ransom should never be paid. Despite whatever threats are made to either destroy all the encrypted data by a certain deadline or publish it on the Internet, the best thing to do is to immediately contact professional cybersecurity and data recovery services for their help. Their business is to deal with these kind of situations with the latest anti-ransomware decryption software to neutralize virus-borne encryption and the viruses themselves. Never trust cybercriminals but always trust the experts to save the day and your files for you.