Home Malware Programs Ransomware cryptoplant@protonmail.com' Ransomware

cryptoplant@protonmail.com' Ransomware

Posted: February 12, 2019

The 'cryptoplant@protonmail.com' Ransomware is a part of the AES-Matrix Ransomware family, which can lock files on the localized computer, as well as any network-shared drives. No freeware decryption solution is available for unlocking your data, and malware experts recommend keeping backups as a standard precaution against infections. Your anti-malware products, while not capable of restoring the files, should remove the 'cryptoplant@protonmail.com' Ransomware as long as they're active at the time of infection.

A Weed Growing over German PCs

Victims in Germany are reporting attacks by a new release from the AES-Matrix Ransomware group, which is one of the smaller and less prolific, but credibly threatening forms of file-locker Trojans. Previously highlighted as a threat benefiting from both shortcut-mimicking and the RIG Exploit Kit-based infection exploits, this family also is capable of blocking data throughout Windows PCs over the local network. What data malware analysts can collect, so far, implies that the 'cryptoplant@protonmail.com' Ransomware is as threatening to digital media as its kin.

Threat actors could be distributing the 'cryptoplant@protonmail.com' Ransomware after brute-forcing vulnerable login credentials or sending disguised e-mail attachments to the victims, along with using the previously-noted exploit kits – packages of browser-based vulnerabilities that load drive-by-downloads. A successful infection lets the 'cryptoplant@protonmail.com' Ransomware use the AES encryption on most of the PC's media files, along with deleting the Shadow Volume Copies that form the backbone of the Windows's backups. The 'cryptoplant@protonmail.com' Ransomware adds its e-mail address, an ID, and the unique 'PLANT' string as extensions onto the names of what it blocks.

The 'cryptoplant@protonmail.com' Ransomware's campaign dates itself to February, but the AES-Matrix family is one of the long-running members of the file-locker Trojan industry. While new threat actors may diverge from old techniques, the tactics that this family lends itself to most readily encourage manual installation by a remote attacker who gains control over the PC. Due to this problem and the 'cryptoplant@protonmail.com' Ransomware's C&C communications, malware experts recommend disabling the network connectivity while you deal with infections.

The Perfect Weedkiller for a Hostile Plant

The AES-Matrix Ransomware family includes numerous members besides the 'cryptoplant@protonmail.com' Ransomware, such as the '.MTXLOCK File Extension' Ransomware, the KOK8 Ransomware, the Matrix-FASTA Ransomware and the Matrix-ITLOCK Ransomware. Unfortunately, all variants available to malware analysts are secure against encryption analysis that could produce a file-unlocking program consistently. Backing up work to another, uncompromised device is most users' only hope of saving their work without the risk of a possibly-futile ransom payment.

Network administrators should guard their login credentials appropriately for preventing any brute-force attacks from giving criminals inside access. Other safety guidelines include disabling JavaScript, Java, and Flash, scanning all your downloads from e-mail and torrent-based sources, and updating all software for correcting non-zero-day vulnerabilities. Anti-malware software, traditionally, shows few problems with uninstalling the 'cryptoplant@protonmail.com' Ransomware or blocking it.

It's unsurprising for Europe to remain under fire by file-locker Trojans with ransoms on their minds. Commerce and industry create profits that criminals, just like the 'cryptoplant@protonmail.com' Ransomware's admin, appreciate skimming when they can.

Loading...