Home Malware Programs Ransomware '.loptr File Extension' Ransomware

'.loptr File Extension' Ransomware

Posted: May 12, 2017

The '.loptr File Extension' Ransomware is a new version of the '.locky File Extension' Ransomware with symptoms including blocking your media with its encryption routine, switching your desktop's background and creating messages soliciting ransoms. Free decryptors may or may not be available for this threat, and malware experts recommend keeping backups or using anti-malware solutions for deleting the '.loptr File Extension' Ransomware by default.

Bringing the Myth of Mischief Back to Life

Threat actors with invested effort in the '.locky File Extension' Ransomware family are proceeding with further updates to the Trojan, in keeping with past iterations. The new variant, the '.loptr File Extension' Ransomware, is another callback to ancient world mythology, similarly to '.odin File Extension' Ransomware. Appropriately, the Trojan's latest name is an alias for the Norse god Loki, a trickster character noted for his shape-shifting and other, disingenuous tactics.

The '.loptr File Extension' Ransomware retains the focus on using the AES and RSA encryptions for locking the files on your computer, which can block documents or other media, possibly permanently. Secondary symptoms malware experts still confirm are:

  • The '.loptr File Extension' Ransomware can reset your desktop's background to another image, which often displays ransom-related information.
  • The '.loptr File Extension' Ransomware adds the '.loptr' extension to any file that it blocks as per the previously explained attack.
  • The '.loptr File Extension' Ransomware also creates a local Web page outlining how to access its TOR ransoming website and pay Bitcoins in exchange for unlocking your media.

While paying doesn't give the victim a certain means of getting a decryption solution to retrieve their encoded media, neither can malware experts guarantee that freeware decryptors will be available for this newest update of the so-called 'Locky' family.

Keeping Deceased Gods as Dead as Possible

E-mail-based attacks are a significant infection strategy for threat actors distributing file-encrypting Trojans in today's environment. Many of these exploits use unsafe content in an attached document such as a DOC or PDF file. Although you may be able to avoid enabling this content, malware experts also recommend scanning downloads with anti-malware tools that can detect potentially unsafe content.

PC users with backups that the '.loptr File Extension' Ransomware can't encrypt or delete always can use them for restoring any content without bothering with a decryptor. If such solutions aren't available, you should contact relevant PC security organizations for help with decoding the '.loptr File Extension' Ransomware's enciphering routine. Intercepting and deleting the '.loptr File Extension' Ransomware with anti-malware tools during the infection attempt is a notably less technically troublesome means of protecting your data.

The '.loptr File Extension' Ransomware's simple existence demonstrates that the Trojan's threat actors aren't waning in enthusiasm for their misdeeds. However, no matter which god's name they promote their attacks with, they have no divine immunity against a backup or a reasonable anti-malware program.

Loading...