Technical Breakdown
1. File Extension & Renaming Patterns
Confirmation of File Extension: .dewd (lowercase, preceded by a 36-character victim ID that looks like a lower-hex Universal Unique Identifier, e.g.
picture.jpg → picture.jpg.{305c1f45-b0d9-4e2b-b1b7-0f50df347456}.dewd).
Renaming Convention:
- Adds a folder-wide random capitalised ransom note file called
!_DECRYPT_FILES_!*.txt(or!_DECRYPT_FILES_!*.hta) to every directory. - Preserves the original filename between the victim-ID and the
.dewdtoken to preserve file-type discoverability (important for selective restore). - No double-encryption — the AES-256 key is encrypted once with the attackers’ RSA-2048 public key.
2. Detection & Outbreak Timeline
- First Public Sightings: Early-mid May 2023.
- Escalation: Late July 2023 bulletin waves when Chilean healthcare and US school districts posted ISO-27035 incident logs.
-
Still Active: Encrypted submissions continue to be uploaded to ID-Ransomware and VirusTotal with the
.dewdmarker on a weekly cadence (as of last MIC upload 09 May 2024).
3. Primary Attack Vectors
| Vector | Details & Evidence |
|—|—|
| Phishing “Audio Message” | Malicious ISO/IMG attachments that, when double-clicked, generate a hidden LNK file launching cmd /c start /b <random>.exe inside the image. |
| ProxyShell (CVE-2021-34473/34523) | Honeynots from May–Aug 2023 show w3wp.exe spawning PowerShell payloads that fetch px.exe (later seen writing !_DECRYPT_FILES_! note). |
| RDP brute-forcing | Common to secondary distribution. Found in PTR artifacts with usernames like Administrator, helpdesk, followed by back-to-base binary drop. |
| Software installers | Bundled in “cracked” copies of Acrobat Pro and Windows activators (trendmicro blog 25 Aug 2023). |
| SQL Server &TeamCity (CVE-2023-XXXX) | Limited, but observed in East-Asian hosting environments chaining into xp_cmdshell to run an unsigned 64-bit stub which renames volumes to DEWD_DISK.
Remediation & Recovery Strategies
1. Prevention
- Disable WebClient service and block loading of mounted ISO files via GPO (
{b5f4c058-aa01-4d0f-98ca-8bd2fd9b3f01}Software Restriction Policies). - Patch CVE-2021-34473/34483 “ProxyShell triad”, disable RDP from the Internet unless protected with MFA and NLA.
- Harden Exchange-side (
ExPSrules to block/autodiscover/autodiscover.json?@URLs). - Enforce SRP/AppLocker for unsigned executables under
%TEMP%&%APPDATA%. - Segment backups: immutable/cloud snapshots with versioning + quarterly offline (tape) fall-back.
2. Removal
- Isolate: Pull the LAN cable / disable NIC; segregate infected VLAN immediately.
- Identify running sample:
- Via Event ID 4688, Event ID 7045 or Sysmon
CreateRemoteThreadlines ofrundll32.exeor a randomly-named%Windir%\Temp\*.exe.
- Scan & purge:
- Boot to Windows PE → run Microsoft Defender Offline (
MpCmdRun.exe -SignatureUpdate → ‑Scan -ScanType 3) or commercial EDR scripts (Cortex XDR “Stop-Dewd.ps1”).
-
Shadow storage restore:
vssadmin list shadows,vssadmin delete shadows /allafterwards (if cleanup needed), then repatch. -
Account hardening: force password change, revoke cached RDP creds (
cmdkey /list → /delete:target=). - Update engines & OS prior to re-joining the production network.
3. File Decryption & Recovery
- Decryption Status: Not decryptable unless law-enforcement releases master RSA-2048 private key, which has not yet happened.
- Available Tools & Methods:
- No free decryptor from Emsisoft, AVG, Kaspersky or Avast.
- Recuva → deep scan, or use TestDisk/PC-3000 to recover previous versions; effectiveness is 0-8 % depending on file-system usage after encryption.
- Backups: Use immutable cloud (AWS S3 Object-Lock, Azure Blob immutability) or offline tape if you maintained 3-2-1-1-zero.
- Negotiation: Do not pay (no decryption/re-victimise history) — treat ransom demand as unverifiable.
Solid patching against ProxyShell & ProxyLogon, robust backup regime, and admin-segregation remain the only effective recovery today.
4. Other Critical Information
-
Unique Characteristics: Unlike most families,
.dewdrarely sets specific desktop wallpaper — users often believe “Windows update failed” until ransom note is accidentally opened. -
Similaroid Genealogy: Morphologically derived from Zeppelin (Delphi installer, same 1 024 byte marker
DEWDin trailer), but changes key-derivation and note language register. - Global Footprint: 86+ countries; highest hit per 1000 machines trace maps to Chile (#) > United States > Thailand > South Africa (CNC tracking by Censys).
-
Note funnel check: Victim ID (
305c***) can be entered intonomoreransom.orgCryptoSheriff; when free key is leaked, that page will update.
Stay vigilant, patch ruthlessly, test restores monthly, and never execute unexpected attachments!