Home Malware Programs Ransomware Princess Locker 2.0 Ransomware

Princess Locker 2.0 Ransomware

Posted: March 13, 2018

Threat Metric

Ranking: 15,812
Threat Level: 8/10
Infected PCs: 7
First Seen: November 15, 2024
Last Seen: March 8, 2025
OS(es) Affected: Windows

The Princess Locker Ransomware is a file-locking Trojan updated from the 2016-dated program of the same name. Just like the earlier version of its software, the Princess Locker Ransomware targets your digital media for locking with an encryption-based attack feature and relies upon extorting money from its victims through its links to an accompanying website. Help from researchers in the anti-malware industry may be capable of unlocking your content without requiring payments, and you can depend on appropriate security software for blocking the Princess Locker Ransomware or deleting the Princess Locker Ransomware automatically.

Royalty that's out for Revenge

The 2016 RaaS or Ransomware-as-a-Service Trojan is getting a new update, two years later. Although its accompanying, ransom-trafficking website has few alterations, malware experts are noting cheaper ransom demands and some changes to how the Princess Locker Ransomware tags its captive files for the victim's recognition. As is also true of other threats leveraging cryptography for their attacks, the most direct defense against the Princess Locker Ransomware is having a secure and well-maintained backup.

Threat actors hire RaaS Trojans by paying either a percentage of their ransom-based earnings or an upfront fee for gaining access to the Trojan, which enables customization of details like the extensions in use or the data types it blocks. They also are in charge of distributing the Princess Locker Ransomware, which may attack a company or government targets, as well as recreational PC owners, via e-mail, torrents, or EKs like the Nebula Exploit Kit.

The Princess Locker Ransomware encrypts JPGs, DOCs, PDFs, and other media, Microsoft Office formats particularly, with a new enciphering method with improvements from the first version (and readers should note that there is a freeware decryptor extant for the 2016 build of the Princess Locker Ransomware). Unlike most file-locker Trojans, malware experts are confirming the Princess Locker Ransomware's use of an additional extension on these files that includes from four to six, random characters. Along with blocking your media, the Princess Locker Ransomware also creates HTML and TXT ransoming messages, that are links to its website, in the same folders merely.

Ending a Line of File-Breaking Princesses

Users trying to unlock their files may use the one, free 'sample' demo of the decryptor at the Princess Locker Ransomware's TOR website. However, any further unlocking of data requires paying a Bitcoin fee that escalates, over time. Since the past version of the Princess Locker Ransomware is decryptable, malware experts have hopes that the new build also may be compatible with new decryption solutions, in time. If you lack backups for a better recovery method, you may contact an experienced researcher in cryptography-based threats for further help on a decryption solution. Paying the Bitcoin fee always includes some risk that the payment will not give you a reciprocal data restoration service.

The infection strategies for delivering the Princess Locker Ransomware can use any of the following means of compromising your computer:

  • E-mail attachments may mislabel the Princess Locker Ransomware's executable or include a hidden drive-by-download attack, such as a Word document-based macro. These spammed messages often have 'hand-crafted' content for their victims.
  • File-sharing networks and websites with high volumes of illicit content often distribute file-locking Trojans and other threats, as well. 'Triple-A' gaming cracks and installers are recurring elements of a variety of file-locking Trojan campaigns.
  • The cybercrooks can take advantage of non-secure passwords for hacking into a network, often, with the help of a brute-force utility.

Since the Princess Locker Ransomware may run itself and damage your files automatically, you should have dedicated anti-malware programs delete the Princess Locker Ransomware, or quarantine it for future analysis, as soon as possible.

This update of the Princess Locker Ransomware is much less costly, regarding its ransoms, relative to the old version. Unfortunately, it also guards against previous decryption solutions; victims no longer can take the recovery of their files for granted.

Loading...