Home Malware Programs Ransomware 'nomoreletters@protonmail.ch' Ransomware

'nomoreletters@protonmail.ch' Ransomware

Posted: February 13, 2019

The 'nomoreletters@protonmail.ch' Ransomware is a variant of the BlackHeart Ransomware (AKA 'BlackRouter'), a Ransomware-as-a-Service threat. This file-locking Trojan can stop media such as databases or documents from opening and deliver ransoming messages, such as pop-ups and Notepad texts. Have backups available for counteracting any loss of files due to this threat and let your anti-malware programs remove the 'nomoreletters@protonmail.ch' Ransomware as soon as practical.

The Blackest Trojan Heart Beats Anew

Although the circulation of smaller, overlooked families of threats like the BlackHeart Ransomware may not be up to par with that of a massive competitor like the Scarab Ransomware, its lower infection rates don't cripple its potential for locking files. A newcomer for this minute Ransomware-as-a-Service group, the 'nomoreletters@protonmail.ch' Ransomware, is launching attacks against the users' files as of early February. Unfortunately, its victims aren't providing sufficient samples for tracking the threat's ransom demands or the method for its compromising PCs.

Although the original author of the RaaS family is likely of being Iranian, the 'nomoreletters@protonmail.ch' Ransomware uses English-based ransoming messages and shows no particular geographical predilections. The 'nomoreletters@protonmail.ch' Ransomware uses a concealed encryption routine for converting files into non-opening content and may tag them with name-based edits, such as different extensions. The 'nomoreletters@protonmail.ch' Ransomware finishes with creating a Notepad 'READ ME' file and an advanced Web page-based pop-up, both of which include the criminal's instructions on purchasing a decryptor.

The 'nomoreletters@protonmail.ch' Ransomware uses a stripped-down pop-up window, in comparison to its ancestors, and excludes the timer that malware analysts find on many versions of the BlackHeart Ransomware family. The victim has little more than an ID key and the threat actor's e-mail for negotiating, although the message specifies Bitcoins as the payment method of choice. Thanks to its anonymity and anti-refunding mechanisms, Bitcoin is overwhelmingly popular among criminals running file-locker Trojan operations.

Turning the 'nomoreletters@protonmail.ch' Ransomware into No More Ransoms

There isn't a free decryption solution to the BlackHeart Ransomware family, which is true of most of the Ransomware-as-a-Service industry similarly. To account for cryptography's highly-accessible security, malware experts recommend maintaining file backups that give ample recovery options to the users whose local media becomes blocked or corrupted. Saving your backup to detached storage or another, secure server can help with recovery without the risk of being extorted.

The 'nomoreletters@protonmail.ch' Ransomware's family has close associations with backdoor-based threats. The users should disable their network connections while disinfecting their PCs and change passwords and related credentials as soon as possible afterward. High-quality anti-malware products have high detection rates for this family and may remove the 'nomoreletters@protonmail.ch' Ransomware without issues, but they can't recover your files.

The 'nomoreletters@protonmail.ch' Ransomware is a possible problem for Windows users around the world, but only as long as they don't have backups. Redundant data storage isn't just a common-sense precaution, but a direct defense against extortionist crimes.

Loading...