Prometey Ransomware
Malware researchers have uncovered a newly released ransomware threat – the Prometey Ransomware. After studying this new file-encrypting Trojan, it became evident that it is not a variant of any of the popular threats of this type. Ransomware threats’ popularity is growing as they are regarded as an easy and relatively safe way to make some quick cash on the backs of innocent users. Cybersecurity researchers work tirelessly to create free decryption tools to help victims of ransomware, but this is not an easy task as there are more and more threats of this type pumped out daily.
Propagation and Encryption
The propagation methods used in the campaign of the Prometey Ransomware are not yet known with full certainty. Cybercriminals that distribute ransomware threats often use spam emails that contain infected attachments. Authors of ransomware tend to design clever messages using social engineering tricks to get the user to launch the attached file. Other common tricks used for the propagation of data-locking Trojans include fraudulent software updates and downloads, bogus pirated media and applications, torrent trackers, etc. The Prometey the victim’s ID.
The Ransom Note
When the encryption process of the Prometey Ransomware has been completed, the threat will drop its ransom message in a text file called ‘
It is not advisable to cooperate with cyber crooks because they, more often than not, do not keep their promises, and you are likely to be left empty-handed even if you decide to give in and pay them. Instead, you should obtain a reputable anti-virus solution that will remove the Prometey Ransomware from your PC safely.