Home Malware Programs Ransomware Oktropys@protonmail.com Ransomware

Oktropys@protonmail.com Ransomware

Posted: June 29, 2018

The Oktropys@protonmail.com Ransomware is a variant of the Aurora Ransomware, a Trojan that can lock your files for later ransoming. Without freeware decryption solutions for this threat, malware experts only can recommend using external backups for retrieving any media, such as documents, that it attacks. Have reputable anti-malware products scan your filesystem for removing the Oktropys@protonmail.com Ransomware, as well as analyze incoming downloads for a potential infection attempt.

Another Daybreak Arrives for the Aurora Ransomware

Unknown threat actors are circulating a new, minor update of the Aurora Ransomware actively, one of the few file-locker Trojans noted for using a DES cipher as its data-blocking method of preference. With malware experts still searching for definitive proof of its infection strategies, the campaign of the Oktropys@protonmail.com Ransomware could be open to using anything from spam e-mails to RDP installations, or even exploit kits with zero-day vulnerabilities, for compromising the targeted systems. The less expensive ransom the Oktropys@protonmail.com Ransomware levies, however, does imply that its threat actors aren't targeting the business sector.

The Oktropys@protonmail.com Ransomware infections include an initial, local executable installer, and a second component that's responsible for locking the system's files with DES encryption. The module isn't an embedded file within the Oktropys@protonmail.com Ransomware's first EXE, but, instead, is a remote download that occurs automatically. Strict network settings, such as an active firewall, could block the acquisition of the encryption half of the program and keep the Oktropys@protonmail.com Ransomware from locking documents, pictures and other media.

Early on, malware analysts saw versions of the Aurora Ransomware creating multiple, redundant text messages for delivering its ransoming instructions on buying a decryptor. The Oktropys@protonmail.com Ransomware release is generating only a single file, instead, and also offers a substantially lower price of fifty USD in Bitcoins, as opposed to the five hundred of the Trojan's first campaigns. However, paying it remains non-recommended, since any criminal can take the money and not bother giving a decryption solution back to his victims.

Turning Down the Lights on Trojan Update

Malware researchers do have evidence of the Oktropys@protonmail.com Ransomware's being in distribution, but how its threat actors are compromising any given PC is a question that requires additional confirmation. Spam e-mail is prominent for circulating most file-locking Trojans of all families, although other exploits also are open to misuse, including file-sharing hubs like torrenting websites and compromised domains running exploit kits that load drive-by-downloads automatically. Blocking corrupted browser scripts, scanning downloads with proper security solutions, and maintaining secure passwords are three protections relevant to counteracting these Trojans' campaigns.

The existence of remote backups always can the threat of permanent data loss that the Oktropys@protonmail.com Ransomware uses for collecting its ransom money. Since this Trojan also includes network-based features, victims of its attacks should monitor the appropriate settings for any unusual changes and revert them, if required. Most anti-malware programs should delete the Oktropys@protonmail.com Ransomware without any assistance from the user.

The Oktropys@protonmail.com Ransomware persists with some of the social manipulation techniques that malware researchers see elsewhere, such as warning its victims that other decryption tools will damage their data or that professional data recovery services will be more expensive than the ransom. While affordability might be the Oktropys@protonmail.com Ransomware's selling point, still, it's not a good reason to forget just backing up your files.

Loading...