Home Malware Programs Ransomware Pr0tector Ransomware

Pr0tector Ransomware

Posted: March 31, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 14,872
First Seen: March 31, 2017
Last Seen: July 19, 2022
OS(es) Affected: Windows

The Pr0tector Ransomware is a Trojan that can encrypt your data, which its threat actors intend as persuasion for paying their ransoms. Like similar threats, preventing the Pr0tector Ransomware's payload from causing any significant damage is most practically done by keeping a backup that you update regularly. Always isolate or remove the Pr0tector Ransomware with dedicated anti-malware products to prevent it from causing any further damages, no matter what file recovery choices you make.

Programs Protecting Nothing but Their Profits

Since memorability ranks high in threat branding ideology, threat authors aren't beyond naming their Trojans highly ironically. Having a name that gives a false impression of what it does is the Pr0tector Ransomware's main claim to fame, with a still-fresh campaign just launching as of the last week of March. Malware experts estimate that potential attacks are taking place in some regions of South America, including Peru and Chile.

The Pr0tector Ransomware's infection vectors may be persisting through weak Remote Desktop or RDP settings that allow con artists to install the threat without the regular user or admin's consent. Such attacks usually originate from passwords already having been compromised in phishing or brute-forcing attacks. After the hackers install it, the Pr0tector Ransomware loads functions including:

  • The Pr0tector Ransomware generates a personal ID string, based on the infected system's hostname data. It uses this data in the ransoming message it drops later.
  • The Pr0tector Ransomware can encrypt your media with a cipher malware analysts still are identifying. The files that it encrypts, and, therefore, locks, can include Microsoft Office media, images, archives, spreadsheets, documents, Web pages, etc.
  • The filenames of the above receive '.pr0tect' extensions that the Pr0tector Ransomware adds after any already-present ones.
  • The Trojan's last function is creating a text file with its demands: to contact one of the threat actor's e-mail addresses and purchase the decryption key. Currently, they seem to be demanding ransom amounts in Bitcoins, equivalent to 525 USD. All ransoming negotiations, so far, are using English, despite the Trojan's attacking South American victims.

Protecting Your Files from Becoming Part of a Trojan's Finances

While the Pr0tector Ransomware does have some similarities in its payload to the Dharma Ransomware and is speculated to be a new variant of that threat, malware experts can't verify the relationship. Victims with samples quarantined by their anti-malware software can consider submitting them to respectable anti-malware researchers for further analysis, which also could help produce a free decryptor. If such research avenues fail, any users without backups will have no other choices for recovering their encrypted files.

Keeping your passwords on a rotating schedule, and using ones that adhere to professional security standards, can prevent remote hacking attempts from gaining access to your computer. In other cases, your anti-malware software can identify disguised files that are most likely to harbor threats and remove the Pr0tector Ransomware preemptively. They can include torrent-distributed downloads of pirated software, along with e-mail attachments formatted to resemble 'legitimate' messages.

The Pr0tector Ransomware is in limited distribution, and much remains uncertain about how it spreads, which targets are considered preferential, or how active its threat actors intend on being. Anyone without a habit of backing up their files will want to consider changing that, with virtually unknown file-encrypting Trojans like the Pr0tector Ransomware greeting every new day.

Loading...