Z

Guides & Newsletters

Grab our growing library of business-related technical resources.



Tech Tuesday

We'll be bringing you new and fascinating information every Tuesday in 2021. Don't miss an episode!



Contact Us

Get in touch with us now.



Log in to Support

Log in to the Support Portal

Open a Support Ticket

Open a Support Ticket and get help.

Connecting to Support

Get help connecting to our remote support tool.

Have You Been Pwned?

Have your passwords been compromised?

Niagara Network and IT Support Logo
  • What’s New
  • About Us
    • We are Hiring
    • FAQs
    • Business Partners
  • Niagara Region
    • IT Services and Computer Repair in Welland
    • Computer Services for St Catharines
    • Computer Repair in St Catharines
    • IT Support in Port Colborne
    • Non-Profit Computer Support
  • Computer Service
    • On Demand Managed Services
    • Niagara UnManaged/On Demand IT Support
    • Office 365
      • Mailboxes, Aliases, Shared Mailboxes, Groups
    • Internet Services
      • Create Your Online Store
      • Web Site Repair
      • Power Hosting
  • Phone Systems
  • Support
Schedule a Chat

Ransomware roundup: Targeting servers, government, honoring Donald Trump and Voldemort

Security researchers have discovered more ransomware under development, namely one paying homage to Voldemort and another featuring Donald Trump, as well as one variant currently targeting servers and yet a different ransomware hitting government agencies and education institutions.

Let’s start with the ransomware that has moved past development into actively locking up computers.

DXXD ransomware targeting servers

On Bleeping Computer forums, there were reports of servers being hit with DXXD ransomware. After a file has been encrypted, “dxxd” is added to the end of a filename such as myimportantfile.jpgdxxd.

The vector of infection is currently unknown, but victims typically get the following ransom note via a ReadMe:

Dear owner, bad news!!!! Your SERVER [hacked], and file’s [ENCRYPTED]!

Victims wanting their files back, and tips on how to protect files and the server in the future, are encouraged to contact one of the two secure and encrypted email addresses at Tutanota and ProtonMail or to reach out via Jabber.

A different victim of the DXXD ransomware reportedly saw the following message on the login screen: “Dear Administrator, YOUR server is attacked by hackers.”

DXXD Ransomware Bleeping Computer

MarsJoke ransomware

Then there is the ransomware targeting local and state governments as well as K-12 educational institutions. It was dubbed MarsJoke by Proofpoint researchers after they found the string “HelloWorldItsJokeFromMars” in the code. Although they had seen MarsJoke back in August, they detected the first large-scale email MarsJoke campaign on September 22.

The researchers believe MarsJoke is being delivered via the Kelihos botnet. The malicious emails include stolen branding and are designed to look like they came from a “major national air carrier” or shipping company. If an unfortunate soul is fooled by the lure, then a file is downloaded that installs MarsJoke and encrypts files.

The victim’s desktop background changes to a ransom note, demanding 0.7 bitcoin before 96 hours are up or the files are deleted. At the time of publishing, .7 bitcoin was equal to $422.16.

marsjoke Proofpoint

Besides state and local government agencies and educational institutions, some healthcare, telecommunications and insurance industries have also been hit, as the attackers are looking for “easy target” organizations that likely do not have strong defensive resources or robust backup procedures.

Donald Trump ransomware

Bleeping Computer’s Lawrence Abrams found Donald Trump ransomware that is currently under development but will likely never be actively distributed. The ransomware has functions to encrypt files using AES, but it doesn’t encrypt anything in its current form. Nevertheless, Abrams urged users to be very cautious about opening election news email attachments.

Donald Trump Ransomware Bleeping Computer

Ransomware named after Lord Voldemort’s pet snake

A malware author who is apparently also a fan of Harry Potter novels is developing ransomware that pays tribute to the villain Voldemort. The ransomware discovered by Michael Gillespie is named after Voldemort’s pet snake Nagini.

Voldemort on Nagini Lock Screen Bleeping Computer

“What is interesting, is that instead of asking for a ransom payment in bitcoins, it is asking for users to enter a credit card number instead,” wrote Lawrence Abrams on Bleeping Computer.

Right now, the Nagini ransomware works only on a test system and targets only a handful of file extensions listed in folders of ransomware developer “Colosseum.”

Unlike the Donald Trump ransomware, Abrams did not predict development on Nagini ransomware will stop, nor did he suggest it will not be distributed. With Halloween just right around corner, who knows if there will be an uptick of ransomware referencing scary or villainous pop culture icons on lock screens?

Source: Ransomware roundup: Targeting servers, government, honoring Donald Trump and Voldemort

Niagara’s Tech Support Services

We approach IT with a simple principle – Keep IT Simple without scrimping on features. We’ve built a proven process that gets IT right every time. Like a Tim Hortons coffee or a MacDonald’s Big Mac. Give your staff the tools they need to succeed.

Enabling only the features you need on technology that grows with your business makes troubleshooting and maintenance a breeze. When you need a new feature, our technology isn’t crippled. We turn it on, document it, monitor it, and your business grows effortlessly.

Don’t leave a critical business component to chance. Talk to us today.

Confidential Information and Password Management Policy

What’s New

How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

by Glen | May 5, 2025 | Tech News

« Older Entries

Follow Us

  • Follow
  • Follow

Address

38 Dorothy St.
Welland ON L3B 3V7

Email Us

info@bowesit.com

Call Us

(289) 479-5606