According to the cyber criminals who designed Dragon, it is impossible to decrypt files without a private key and decryption software ("Dragon Decryptor"), both of which are stored on a remote server accessible only by Dragon ransomware developers. Victims are unable to access/restore their files without the involvement of the ransomware developers.
Additionally, victims are encouraged to purchase the aforementioned decryption tools immediately, otherwise some factors (such as cost of decryption) might change. Victims are permitted to send three encrypted files to dragon-...@pm.me. The developers will decrypt these free of charge to 'prove' that they have valid decryption tools.
To decrypt other files, victims must use decryption software and a key at a cost of .3 Bitcoin. These tools are sent after the payment is made via a Bitcoin wallet address, which should be provided after sending the email. Do not trust cyber criminals (ransomware developers) - they often send no decryption keys/software even when their demands are met.
Fortunately, files locked by Dragon can be decrypted with free software developed by Emsisoft. Furthermore, this ransomware does not affect computers that use China, Hong Kong, or Taiwan IP addresses.
Most ransomware-type programs have similar characteristics. They lock data by encryption and create ransom messages with information about how to pay ransoms and other details. The two main differences are usually cost of decryption software and/or key and cryptographic algorithm (symmetric or asymmetric) that is used to encrypt files.
Typically, the only way to recover files free of charge is to restore them from a backup. Therefore, have data backed up and store it on a remote server or unplugged storage device. Some examples of other programs of this type are Grethen, Nacro, and Nasoh.
Cyber criminals proliferate ransomware-type programs through spam campaigns, other malicious programs called trojans, dubious file and software download channels, unofficial software activation tools and fake updaters. Using spam campaigns, they they send emails that contain malicious attachments, which might be Microsoft Office or PDF documents, archive files such as ZIP, RAR, executable files (.exe and other files), JavaScript files, etc.
Their main goal is to trick people (recipients) into downloading and opening the files. When opened, they download and install ransomware or other high-risk malware. Trojans perform chain infections: after installation, these programs proliferate (download and install) other malicious programs.
Examples of dubious software download sources are freeware download websites, free file hosting pages, Peer-to-Peer networks such as torrent clients, eMule, and third party downloaders or installers. Cyber criminals use these methods to present (disguise) infected files as legitimate and harmless.
People who download and then open files downloaded from these sources often cause installation of malware such as ransomware. Unofficial software activation ('cracking') tools supposedly help users to bypass paid software activation, however, in many cases, cyber criminals employ these tools to proliferate ransomware.
These tools commonly download and install malicious software. Unofficial updating tools infect computers by downloading and installing malicious programs rather than updates, fixes, or by exploiting bugs/flaws of already installed, outdated software.
To keep computers/operating systems safe, download, install, update software and browse the Internet with care. Do not download or install programs or files using third party software downloaders, installers, or other such tools. The safest option is to use official and trustworthy websites.
Update installed software through implemented functions or tools provided/designed by official developers. Web links or attachments that are included in irrelevant emails and received from unknown, suspicious addresses should not be opened.
Licensed (paid) software should be activated properly, since third party ('cracking') tools are illegal and often cause damage to computers by installing malware. Additionally, routinely scan the operating system with reputable anti-virus or anti-spyware software and remove detected threats immediately.
#What happened to your files?
All your files has been encrypted by a strong encryption with RSA-2048.
More information about the encryption keys using RSA-2048 can be found here: _(cryptosystem)
#What does this mean?
This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them.
#What do I do?
Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really value your data, then we suggest you do not waste valuable time searching for the solutions because they do not exist.
Trying to reinstall the system and decrypting the file with a third-party tool will result in file corruption which means no one can decrypt your file(including us)!
If you still try to decrypt the file yourself, you do so at your own risk!
#Test decryption!
As a proof, you can send 3 encrypted files and ID to test decrypt,and we will send you the decrypted files to prove that we can decrypt your files.
To decrypt all your files, you need to buy Dragon Decryptor.
#How to buy Dragon Decryptor?
1.buy 0.3 bitcoin at
2.contact us by email to get a payment address
3.send bitcoin to our payment address
4.after payment,we will send you Dragon Decryptor
If you are a victim of a ransomware attack we recommend reporting this incident to authorities. By providing information to law enforcement agencies you will help track cybercrime and potentially assist in the prosecution of the attackers. Here's a list of authorities where you should report a ransomware attack. For the complete list of local cybersecurity centers and information on why you should report ransomware attacks, read this article.
Some ransomware-type infections are designed to encrypt files within external storage devices, infect them, and even spread throughout the entire local network. For this reason, it is very important to isolate the infected device (computer) as soon as possible.
The easiest way to disconnect a computer from the internet is to unplug the Ethernet cable from the motherboard, however, some devices are connected via a wireless network and for some users (especially those who are not particularly tech-savvy), disconnecting cables may seem troublesome. Therefore, you can also disconnect the system manually via Control Panel:
Right-click on each connection point and select "Disable". Once disabled, the system will no longer be connected to the internet. To re-enable the connection points, simply right-click again and select "Enable".
As mentioned above, ransomware might encrypt data and infiltrate all storage devices that are connected to the computer. For this reason, all external storage devices (flash drives, portable hard drives, etc.) should be disconnected immediately, however, we strongly advise you to eject each device before disconnecting to prevent data corruption:
Some ransomware-type might be able to hijack software that handles data stored within "the Cloud". Therefore, the data could be corrupted/encrypted. For this reason, you should log-out of all cloud storage accounts within browsers and other related software. You should also consider temporarily uninstalling the cloud-management software until the infection is completely removed.
This, however, is rare. In most cases, ransomware infections deliver more direct messages simply stating that data is encrypted and that victims must pay some sort of ransom. Note that ransomware-type infections typically generate messages with different file names (for example, "_readme.txt", "READ-ME.txt", "DECRYPTION_INSTRUCTIONS.txt", "DECRYPT_FILES.html", etc.). Therefore, using the name of a ransom message may seem like a good way to identify the infection. The problem is that most of these names are generic and some infections use the same names, even though the delivered messages are different and the infections themselves are unrelated. Therefore, using the message filename alone can be ineffective and even lead to permanent data loss (for example, by attempting to decrypt data using tools designed for different ransomware infections, users are likely to end up permanently damaging files and decryption will no longer be possible even with the correct tool).
Another way to identify a ransomware infection is to check the file extension, which is appended to each encrypted file. Ransomware infections are often named by the extensions they append (see files encrypted by Qewe ransomware below).
One of the easiest and quickest ways to identify a ransomware infection is to use the ID Ransomware website. This service supports most existing ransomware infections. Victims simply upload a ransom message and/or one encrypted file (we advise you to upload both if possible).
The ransomware will be identified within seconds and you will be provided with various details, such as the name of the malware family to which the infection belongs, whether it is decryptable, and so on.
If your data happens to be encrypted by ransomware that is not supported by ID Ransomware, you can always try searching the internet by using certain keywords (for example, a ransom message title, file extension, provided contact emails, crypto wallet addresses, etc.).
Encryption algorithms used by most ransomware-type infections are extremely sophisticated and, if the encryption is performed properly, only the developer is capable of restoring data. This is because decryption requires a specific key, which is generated during the encryption. Restoring data without the key is impossible. In most cases, cybercriminals store keys on a remote server, rather than using the infected machine as a host. Dharma (CrySis), Phobos, and other families of high-end ransomware infections are virtually flawless, and thus restoring data encrypted without the developers' involvement is simply impossible. Despite this, there are dozens of ransomware-type infections that are poorly developed and contain a number of flaws (for example, the use of identical encryption/decryption keys for each victim, keys stored locally, etc.). Therefore, always check for available decryption tools for any ransomware that infiltrates your computer.
795a8134c1