


The message in the pop-up provides more information about the ransomware attack. The text file merely states that the victims' data has been locked and urges them to write to the listed email. Screenshot of files encrypted by Like (Dharma) ransomware: For example, a file originally named " 1.jpg" appeared as " ransom-demanding messages were created/displayed in a pop-up window and a text file titled " FILES ENCRYPTED.txt". The titles of affected files were appended with a unique ID assigned to the victim, the cyber criminals' email address, and a ". Once we executed a sample of Like (Dharma) ransomware on our test machine, it encrypted files and changed their filenames.

While investigating new submissions to VirusTotal, our research team discovered a ransomware named Like that belongs to the Dharma family.
