Crysis, also known as Dharma, is a persistent ransomware family that has been active since 2016, primarily targeting small and medium-sized businesses (SMBs). Unlike more advanced ransomware strains that focus on high-value targets, Crysis/Dharma focuses on organizations with weaker cybersecurity defenses.
Ransom demands typically range from $500 to $10,000, and the ransomware spreads through compromised remote desktop protocol (RDP) systems. Crysis/Dharma has impacted businesses across North America and Europe, leading to operational disruptions and financial losses in various sectors.
What is Crysis/Dharma Ransomware?
Crysis/Dharma is a ransomware family that encrypts files on a victim’s system and demands a ransom payment for the decryption key. The ransomware typically spreads through RDP attacks, where attackers gain access to poorly secured systems by exploiting weak passwords or unpatched vulnerabilities.
Once the ransomware is deployed, it encrypts a wide range of file types and appends a unique extension to each file, often including the attacker’s contact information. Victims are presented with a ransom note demanding payment in Bitcoin to restore access to their encrypted files.
How does Crysis/Dharma work?
Crysis/Dharma ransomware spreads through compromised RDP connections, which are often poorly secured with weak or default passwords. Once attackers gain access to a system, they install the ransomware and begin encrypting files.
The ransomware appends a unique extension to each encrypted file and leaves a ransom note with instructions for contacting the attackers and paying the ransom. Victims are typically given a short window to pay the ransom, with amounts ranging from $500 to $10,000, depending on the size and resources of the organization.
Unlike more advanced ransomware families, Crysis/Dharma does not typically use double extortion tactics, focusing instead on encrypting files and demanding payment for decryption.
History and Evolution
Crysis ransomware was first identified in 2016, and it quickly became known for its focus on RDP vulnerabilities. Over time, the ransomware evolved into Dharma, but it retained many of its original tactics, including spreading through compromised remote desktop systems.
Dharma became a persistent threat to small and medium-sized businesses, particularly in sectors with weaker cybersecurity defenses. Despite the availability of decryption tools for some Dharma variants, new versions continue to emerge, making it a persistent threat in the ransomware landscape.
Notable Attacks
Crysis/Dharma has been involved in numerous attacks on small and medium-sized businesses:
- Healthcare Providers: Crysis/Dharma has targeted multiple healthcare organizations, encrypting patient records and disrupting services. The ransomware has impacted clinics, small hospitals, and medical service providers, particularly in North America.
- Retail and Hospitality: Dharma has also been used to target retail and hospitality businesses, where the ransomware encrypted payment processing systems and customer databases. Victims faced significant operational disruptions and financial losses.
- Professional Services: Law firms, accounting firms, and consultancies have been frequent targets of Crysis/Dharma, where the encryption of sensitive client data has forced some businesses to pay the ransom to avoid extended downtime.
Impact and Threat Level
Crysis/Dharma’s impact is particularly severe in small and medium-sized businesses (SMBs), where the ransomware can cause operational disruptions and financial losses. The ransom demands typically range from $500 to $10,000, but the real cost often comes from downtime and recovery efforts.
Industries such as healthcare, retail, and professional services have been heavily impacted by Dharma attacks, and the ransomware’s reliance on RDP vulnerabilities makes it a persistent threat for organizations with weak cybersecurity defenses.
Although some decryption tools are available for older variants of Dharma, new versions continue to emerge, posing a constant risk to SMBs that rely on remote desktop connections.
Mitigation and Prevention
To protect against Crysis/Dharma ransomware, organizations should implement the following cybersecurity measures:
- RDP Security: Secure remote desktop connections with strong passwords, multi-factor authentication (MFA), and restricted access to essential personnel only.
- Patch Management: Regularly update and patch systems to close vulnerabilities that could be exploited by ransomware attackers.
- Data Backups: Maintain regular, offline backups of critical files to ensure data recovery without paying the ransom.
- Antivirus and Endpoint Protection: Use reputable antivirus and endpoint protection solutions to detect and block ransomware before it can encrypt files.
- User Training: Educate employees about the risks of weak passwords and how to recognize phishing emails that may lead to ransomware infections.
FAQs
- What industries are most affected by Crysis/Dharma ransomware?
Crysis/Dharma primarily targets small and medium-sized businesses (SMBs) in sectors such as healthcare, retail, and professional services. - How much does Crysis/Dharma typically demand in ransom?
Ransom demands for Crysis/Dharma typically range from $500 to $10,000, depending on the size and resources of the victim organization. - What makes Crysis/Dharma ransomware unique compared to other ransomware?
Crysis/Dharma focuses on exploiting RDP vulnerabilities, making it a persistent threat to businesses that rely on remote desktop connections for operations.
Conclusion
Crysis/Dharma ransomware remains a persistent threat to small and medium-sized businesses, particularly those with weak RDP security and cyber defenses. By exploiting remote desktop vulnerabilities, Crysis/Dharma can easily infiltrate a system and encrypt critical files, causing operational disruptions and forcing victims to pay ransom demands to recover their data.
To defend against Crysis/Dharma and similar ransomware threats, organizations must adopt strong RDP security, patch management, and backup strategies to mitigate the risk of infection and ensure business continuity.