Decrypt THIS! Ransomware dev taunts security researchers in support forum

DXXD doesn’t display a ransom note like other ransomware…

David bisson
David Bisson

Dxxd ransomware

A ransomware developer taunted security researchers in a tech support forum by egging them on to decrypt the newest version of their malware.

News of the DXXD ransomware first emerged in a forum post from Michael Gillespie, a security researcher who has spotted and developed decryption tools for numerous examples of crypto malware.

Ransomware messa

Sign up to our free newsletter.
Security news, advice, and tips.

There’s nothing particularly interesting about the DXXD ransomware. When it encrypts a victim’s files, it appends dxxd to each affected filename.

That goes for files that DXXD finds on a target computer as well as network shares.

Encrypted files
Source: Bleeping Computer

What is interesting, however, is the way the ransomware displays its ransom note.

As noted by Lawrence Abrams, a computer security expert at Bleeping Computer:

“This ransomware… also configures a Windows Registry setting that is used to display a legal notice when people log into a computer. By configuring these registry keys, the ransomware developer knows that any a user who tries to login to the server will see the ransom note.”

Specifically, the ransomware changes the registry values:

HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonLegalNoticeCaption and HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonLegalNoticeText.

Doing so makes sure each and every user will see the ransom note before they log into their account.

Legal notice
Source: Bleeping Computer

Microsoft Windows Security Center. Dear Administrator, YOUR server is attacked by hackers. For more infromations and recommendations, write to our experts by e-mail

After receiving word of DXXD, Gillespie created a decryption tool for the ransomware that allowed victims to restore access to their files for free.

Unfortunately, the ransomware developer cut the life of that utility short by modifying DXXD’s code.

But they didn’t stop there.

Determined to have the last word, the author posted on Bleeping Computer and egged Gillespie and others to decrypt the ransomware’s newest version.

Dxxd forum message
Source: Bleeping Computer

hello guys..
how are you?
decrypt a new vesrion??? (its pre alpha vesrion)

The malware developer says that they have made DXXD harder to decrypt by using a zero-day vulnerability affecting Windows computers, something which Abrams thinks the author is using to hack into servers using Remote Desktop Services and brute force passwords.

Users should prepare for a ransomware infection by backing up their critical data on a regular basis. That way, they won’t need to pay the ransom if they suffer an infection. They should also maintain an up-to-date anti-virus solution on their computers and keep their software updated.

There is currently no decryption tool for DXXD. That means all victims should remove the malware from their computers, restore their files using their data backups, and change all passwords saved on their affected machines.

David Bisson is an infosec news junkie and security journalist. He works as Contributing Editor for Graham Cluley Security News and Associate Editor for Tripwire's "The State of Security" blog.

14 comments on “Decrypt THIS! Ransomware dev taunts security researchers in support forum”

  1. Bob

    I see they're using two of the most secure email services at there: ProtonMail and Tutanota.

    The irony.

    1. Bob · in reply to Bob

      I should have added that the following critical patches were released yesterday. Update ASAP.

  2. Elliot Alderson

    DXXD2 is cracked, go to bleepingcomputer to get updated info about this.

    you're welcome

    1. Bob · in reply to Elliot Alderson

      Not according to your link. Read it carefully.

      "Researchers are currently analyzing the sample and looking for weaknesses. If one can be found, a decryptor will be released for free."

      1. Michael Gillespie · in reply to Bob

        It's decryptable, check my comment. The new decrypter is only being shared in private for now, victims just have to post in the forum for help.

        1. ab1201 · in reply to Michael Gillespie

          I need the latest decryption tool!

          1. David bissonDavid Bisson · in reply to ab1201

            Michael Gillespie published a decrypter on Bleeping Computer. It looks like it covers only early versions, but you can try it anyway. You can find a link for it here:


            Hope it works out for you! If not, contact Michael and see if he can help you any further.

          2. Michael Gillespie · in reply to David Bisson

            I wrote a separate decrypter for the second variant of DXXD. It is now publicly released, try the DXXD2Decrypter:

            This person may have already posted in that topic (and other topics on BC and PM'd me), and we have not confirmed if it is really DXXD they are dealing with. They have files with the extension .aes256, and we have no proof of a connection yet (or sample of the malware).

  3. kmjnhbgvfcd

    Stupid fuckin' russians, insecure as all fuck, and trying to impress someone with his kiddie-script coding skills!

    "Oh my god, look at me! Look at the really, really good code that I wrote, all by myself too!" the loser screams.

    He learned by hacking into gay porn sites.

    Likes it up the ass, you see.

    With the big crazy $300 that encryption will make him, perhaps he can buy a little russian boyfriend.

    Ya think?

    1. coyote · in reply to kmjnhbgvfcd

      Russians? Last I knew .de was Germany (if you knew anything about German or even had any idea about country codes, you might be able to put that together..might being keyword). The location stated on his profile suggests Iceland.

      Charming display of racism and bigotry.


    So the script Kiddies are at it again, huh!??! Poor selfish little snots. Boo hooo I have no life so I must create a malware to hurt people! Get a life you Newbs! Anyone who gets infected deserved to be infect, Know what not to open. If you don't know, then STAY OFF THE INTERNET!!!!!!

  5. IT Rockstars

    Suprised that he posted in the forum – that's just asking for trouble.

    1. M.Cihan Erdem · in reply to IT Rockstars

      hi, anyone knows solution for xtbl, cerber3 and cerber4 ransomwares ?

      1. anon mcanon · in reply to M.Cihan Erdem

        You can try this for XTBL: .

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.