FortiGuard Labs’ bi-weekly Ransomware Roundup covers the DoDo and Proton variants, detailing their infection vectors, encryption behavior, and observed indicators, along with Fortinet protections and recommended defenses. The report highlights DoDo as a Chaos ransomware derivative using Masquerading and Mercurial Grabber, and Proton as a newer Windows-focused family with multiple variants and contact methods for ransom, plus guidance for defense.
#DoDo #Proton #MercurialGrabber #ChaosBuilder #FortiGuard #Fortinet
#DoDo #Proton #MercurialGrabber #ChaosBuilder #FortiGuard #Fortinet
Keypoints
- Fortinet’s Ransomware Roundup analyzes DoDo and Proton ransomware variants targeting Windows users and classifies the impact as High.
- DoDo is a Chaos ransomware derivative that is masquerading as Mercurial Grabber, an open-source infostealer builder.
- Mercurial Grabber can steal Discord tokens, machine information, Windows product keys, and Chrome passwords from victims’ machines.
- Older DoDo variants used dodov2_readit.txt and .dodov2; newer variants use PLEASEREAD.txt and .crypterdodo with changed Bitcoin/Monero handling and wallpaper changes.
- The Proton ransomware encrypts files, adds a .[attacker].Proton extension, drops ransom notes, and changes desktop wallpaper, with multiple variants and contact methods.
- Fortinet provides protections via AV signatures and FortiEDR, and offers guidance on phishing awareness, backups, Zero Trust, and incident response services.
MITRE Techniques
- [T1036] Masquerading – The DoDo ransomware samples are masquerading as the Mercurial Grabber application; the article notes: “The masquerading of free apps and tools is a classically simple yet effective attack vector used by cybercriminals for years. However, in this case, the DoDo ransomware is masquerading as the nefarious Mercurial Grabber application…”
- [T1003] Credential Access – Mercurial Grabber’s built-in functions can steal credentials such as “Discord tokens, machine information, Windows product keys, and Chrome passwords” from victims’ machines: “…infostealer configured to steal information such as Discord tokens, machine information, Windows product keys, and Chrome passwords…”
- [T1486] Data Encrypted for Impact – DoDo and Proton encrypt files and demand ransom; DoDo notes: “The newer DoDo variants drop a ransom note labeled ‘PLEASEREAD.txt,’ add a ‘.crypterdodo’ extension to the encrypted files, and replace the desktop wallpaper with the same ransom message. The ransom demand is still $15 worth of Bitcoin or Monero (XMR).”
- [T1566.001] Phishing – Fortinet guidance notes that “the majority of ransomware is delivered via phishing,” underscoring phishing as a common initial access vector.
Indicators of Compromise
- [SHA2] File hashes – 8727091cbb89e5e31eeb2503ffaa242601c8840eee0973fd62fedf1b4b58ab44, f912cd2a6cd21e828dc32b97eac0ce9b2c4e8d5a7944deaa4bd61f41ab8e1997, and 15 more hashes
Read more: https://www.fortinet.com/blog/threat-research/ransomware-roundup-dodo-and-proton