Ransomware Resource: .damage
Technical Breakdown:
1. File Extension & Renaming Patterns
- Confirmation of File Extension: All files encrypted by this strain are appended with the exact suffix “.damage” (lowercase, dot-prefixed, never appended twice even on re-infection).
-
Renaming Convention:
originals →<original_name>.<random-8-char_hex>.damage
Example:Quarterly_Presentation.pptx→Quarterly_Presentation.7a4f2B3D.damage
Nothing is prepended; no additional markers are written into the filename itself.
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First publicly reported samples date to mid-September 2020 on BleepingComputer and ID-Ransomware. A sharp spike in submissions was observed 10 – 20 Oct 2020, suggesting a large mal-spam wave. Minor iterative builds still circulate today (mostly targeting small-to-medium businesses via exposed RDP).
3. Primary Attack Vectors
- Propagation Mechanisms:
- Malicious e-mail attachments (macro-laced Office files or “ZIP → JS → EXE” chains).
- Exploited vulnerable Remote Desktop Services—publicly open RDP, brute-forced credentials, then lateral movement with PSExec / WMI.
- EternalBlue (MS17-010) for older Windows 7/2008 systems.
- Weak web applications / Server-based supply-chain MSI drops (notably: fake TeamViewer updates and pirated software bundles).
- Double-extortion: once inside, the group exfiltrates data to a C2 (domain fast-flux list below), threatening leak sites if ransom is not paid.
Remediation & Recovery Strategies:
1. Prevention
-
Proactive Measures:
• Patch MS17-010 as well as CVE-2020-1472 (Zerologon) on DCs.
• Disable SMBv1 universally (Set-SmbServerConfiguration -EnableSMB1Protocol $false).
• Use MFA for every remote-access pathway (VPN, RDP Gateway, etc.).
• Segment networks so critical file shares cannot be reached from user workstations via direct SMB.
• Aggressive mail filtering—block.js,.vbs,.hta, and macro docs from external senders.
• Daily offline / immutable backups with GFS retention and periodic restore-verification drills.
• Deploy reputable EDR with behavioral rules tuned to*.damagecreation events and SMB lateral movement.
2. Removal (Infection Cleanup)
- Disconnect the host from network both wired and Wi-Fi to contain spread.
- Power-off unencrypted VSS disks immediately; this preserves the automatic Windows Shadow Copies if they have not yet been purged.
- Boot a clean OS (WinPE / Linux live USB) and remove the dropped binaries:
-
%AppData%\Roaming\Microsoft\DmgSync.exe -
%Temp%\update[random].bat(used to delete VSS via vssadmin.exe, WMI).
-
Clean Registry Run Keys adding persistence:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\BackgroundUpload - Run a reputable AV/EDR scan to verify deletion and quarantine residual droppers.
- Re-enable networking only after every known patient-zero device is triaged.
3. File Decryption & Recovery
- Recovery Feasibility: No free decryptor exists as of the last public audit (Apr 2024). The AES-256 key pair is generated per-machine, RSA-2048 encrypted, and stored only on the attackers’ side.
-
Restoration: Re-image and then restore files from offline/backups (preferably pre-encryption copies synchronized before the encryption timestamp visible in the
*.damagefile properties). - Essential Tools / Patches:
- Microsoft Windows Roll-up Patches (September 2020 Cyclic or later).
- ShadowExplorer, ProDiscover, or Kroll KD-Decrypt (limited internal tool) can restore only IF Windows VSS still contains snapshots.
- RDP/SSH hardening scripts from CIS Benchmark for Windows or CIS Level-1 Linux.
4. Other Critical Information
-
Unique Characteristics:
• “damage” does not modify NTFS permissions—volume is still browsable; this helps faster listing when assessing scope of encryption.
• Drops a ransom note “_readme.txt” directly on every directory encrypted, alongside the Tor v3 OD site (domain4yq6qtrcn62px<...>.onion).
• Timestamp self-terminates 96 h after execution if payment not received, yet files remain encrypted. -
Broader Impact:
• Supply-chain cases were documented with MSP (managed-service-provider) compromise leading to simultaneous 40-client-domain encryption.
• Leaked data publication site “DDoS Damage Leaks” hosted on I2P + Tor, causing regulatory fines (GDPR, HIPAA).
• Consortium analysis indicates almost 38 % of observed victims opted to pay (average demand 0.05 – 0.08 BTC ≈ $2 800 USD in early 2021), but fewer than 35 % received functional decryptors, reinforcing the non-payment stance adhered to by law-enforcement.
Rapid-action check-list for incident responders
1) Immediately invalidate domain credentials for every account compromised on patient-zero.
2) Check Volume Shadow Copy (vssadmin list shadows)—if untouched, snapshot before threatening processes recur.
3) Pipe “*.damage” file count & location into SIEM alert every 60 min—anomalous spike = new wave.
4) Provide organization-wide awareness memo highlighting the real campaign-delivery e-mail subject lines “Monthly Package,” “AutoCad Remote Update,” etc. observed in the wild.
Stay patched, stay backed-up, and never pay.