Threat Database Ransomware Prometey Ransomware

Prometey Ransomware

By GoldSparrow in Ransomware

Malware researchers have uncovered a newly released ransomware threat – the Prometey Ransomware. After studying this new file-encrypting Trojan, it became evident that it is not a variant of any of the popular threats of this type. Ransomware threats’ popularity is growing as they are regarded as an easy and relatively safe way to make some quick cash on the backs of innocent users. Cybersecurity researchers work tirelessly to create free decryption tools to help victims of ransomware, but this is not an easy task as there are more and more threats of this type pumped out daily.

Propagation and Encryption

The propagation methods used in the campaign of the Prometey Ransomware are not yet known with full certainty. Cybercriminals that distribute ransomware threats often use spam emails that contain infected attachments. Authors of ransomware tend to design clever messages using social engineering tricks to get the user to launch the attached file. Other common tricks used for the propagation of data-locking Trojans include fraudulent software updates and downloads, bogus pirated media and applications, torrent trackers, etc. The Prometey the victim’s ID.

The Ransom Note

When the encryption process of the Prometey Ransomware has been completed, the threat will drop its ransom message in a text file called ‘-help.txt’ where the first part of the name corresponds to the extension that the threat appends to the locked files. In the note, the attackers inform the user that they have become a victim of a ransomware threat. They alsgive instructions on how to recover the compromised data. The authors of the Prometey Ransomware instruct the user to download and install the Tor browser, which is the only browser that allows users to access the Deep Web. Then, they demand that the victim visits their Tor-based page and pay the ransom fee demanded in the shape of Bitcoin.

It is not advisable to cooperate with cyber crooks because they, more often than not, do not keep their promises, and you are likely to be left empty-handed even if you decide to give in and pay them. Instead, you should obtain a reputable anti-virus solution that will remove the Prometey Ransomware from your PC safely.


Most Viewed