Home Malware Programs Ransomware Look1213@protonmail.com Ransomware

Look1213@protonmail.com Ransomware

Posted: June 1, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 84
First Seen: June 1, 2017
OS(es) Affected: Windows


The 'look1213@protonmail.com' Ransomware is a Trojan that promotes file-locking attacks to extort money from its victims. PC users who fail to block this threat can use free data recovery options, such as freeware decryptors, although malware experts stress using backups as being the better solution to this file damage. Remove the 'look1213@protonmail.com' Ransomware with any brand of anti-malware software that you trust before taking any other recovery steps appropriate to your situation.

Trojans Diving in from the Remotest Locations

Blatant user errors like clicking on corrupted files or websites aren't always the genesis of a Trojan campaign. For some attacks, particularly ones leveraging file-encrypting payloads, the victim's only mistake might be using a bad password for their server. This introduction method is one that malware experts are continuing to see rising among members of the BTCWare Ransomware family and its extant variants, like the 'look1213@protonmail.com' Ransomware.

Threat actors that install it after they gain prior access to a vulnerable Windows PC are spreading the ‘look1213@protonmail.com’ Ransomware manually. No specialized tools, such as rootkits, need to be involved necessarily, since the Remote Desktop Protocol (or RDP) features, alone, allow sufficient access to let the on artists infect the computer. The initial breach could arise from brute-forcing an inappropriately weak password (such as 'password123' or 'admin1'), or the 'look1213@protonmail.com' Ransomware's authors having acquired it through old phishing attacks.

The 'look1213@protonmail.com' Ransomware locks documents and similar formats of media with a background process, also appending the threat actor's e-mail address to the name in brackets. As per usual for most families of file-encoding Trojans, malware experts only find symptoms of significant visibility after the file-damaging routine completes, and the 'look1213@protonmail.com' Ransomware creates a text-based ransoming message.

Solving the Security Problem that You Find out about Too Late

The BTCWare Ransomware family is notable for using variable ciphers in different versions, including the ever-popular AES and the less prominent RC4. Since these changes can impact how easy it is for you to unlock your files, be careful to back up any content before running it through free decryptors, even ones customized for the 'look1213@protonmail.com' Ransomware's family. Malware experts also encourage keeping remote backups that store your data out of harm's way before this Trojan infects your computer.

Proper password management is crucial to preventing threat actors from compromising your PC remotely and installing threats that can hold your data for ransom. Although the 'look1213@protonmail.com' Ransomware's authors offer samples of their decryption services and may barter with their fees, a ransom payment, ultimately, can't guarantee that they'll unlock any documents, pictures or other content. PC owners can use standard anti-malware applications for removing the 'look1213@protonmail.com' Ransomware infections afterward. They also may wish to quarantine it to provide sample analysis for interested security researchers.

There's never a safe time to take your passwords for granted as being impenetrable. Using common words or phrases, not alternating your cases, and using few or no numerical characters are some of the easiest ways to invite Trojans like the 'look1213@protonmail.com' Ransomware into your server.

Loading...