Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Jul 20, 2020 | Updated Jul 31, 2020

Ransom:Win32/Dopplepaymer

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Dopplepaymer campaign operators have carried out several highly publicized attacks against various organizations around the world. Like most ransomware, Dopplepaymer encrypts files to prevent affected users from accessing data on their devices. It then displays a ransom note to demand payment in exchange for restoring access to the encrypted data.

Dopplepaymer has been delivered using existing malware infections, or during attacks that use RDP brute-forcing or take advantage of network configuration weaknesses and vulnerable services. After gaining access to the network, campaign operators use credential theft and reconnaissance tools to persist and move across the network. They then deploy Dopplepaymer to select devices on the network.

For more information about Dopplepaymer and other human-operated ransomware campaigns, read these blog posts:    

Ransomware groups continue to target healthcare, critical services

Human-operated ransomware attacks: A preventable disaster

There is no one-size-fits-all response if you have been victimized by ransomware. To recover files, you can restore backups. There is no guarantee that paying the ransom will give you access to your files.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us