Proton (Xorist) Ransomware Will Encrypt Victim Systems

ransomware

During our routine assessment of new file samples, our research team came across the Proton ransomware variant. This malicious software is associated with the Xorist ransomware family. Malicious programs falling under this category encode data and request payment for the decryption process.

Upon testing the Proton (Xorist) ransomware on our experimental system, it carried out the encryption of files and added a ".PrOToN" extension to their original names. To illustrate, a file named "1.jpg" underwent a transformation to "1.jpg.PrOToN," while "2.png" changed to "2.png.PrOToN," and so forth for all locked files.

Subsequently, the program altered the desktop background and generated ransom notes in the form of a pop-up window, desktop wallpaper, and a text document labeled "HOW TO DECRYPT FILES.txt." These ransom notes communicate to the victim that their files have been encrypted and that the sole avenue for restoring them is by making a payment to the attackers. The ransom amount is specified as 0.045 BTC (Bitcoin cryptocurrency), which, based on prevailing exchange rates, is approximately equivalent to 1300 USD (bear in mind that exchange rates are subject to constant fluctuations). Once the ransom is paid, the notes assure the victim that the necessary decryption keys and software will be provided.

Proton Ransom Note Asks for $1300 in Bitcoin

The full text of the Proton ransom note reads as follows:

Hello

All your files have been encrypted
if you want to decrypt them you have to pay me 0.045 bitcoin.

Make sure you send the 0.045 bitcoins to this address:
(alphanumeric string)

If you don't own bitcoin, you can easily buy it from these sites:
www.coinmama.com
www.bitpanda.com
www.localbitcoins.com
www.paxful.com

You can find a larger list here:
hxxps://bitcoin.org/en/exchanges

After sending the bitcoin, contact me at this email address:
protonis2023@tuta.io with this subject: -
After the payment has been confirmed,
you will get decryptor and decryption keys!

You will also receive information on how to defend against another ransomware attack
and the most important thing is your security hole through which we entered.

Attention!
Do not try other cheaper decryption options because nobody and nothing can
decrypt your files without the keys generated for your server,
you will lose time, money and your files forever!

How Can Ransomware Like Proton Enter Your System?

Ransomware like Proton can infiltrate your system through various means, often exploiting vulnerabilities or human actions. Here are some common ways ransomware can enter your system:

  • Phishing Emails: Cybercriminals often send convincing emails with malicious attachments or links. Clicking on these links or opening infected attachments can trigger the ransomware installation.
  • Malicious Links: Clicking on infected links from websites, social media, or instant messaging platforms can lead to ransomware downloads or drive-by attacks.
  • Malvertising: Malicious advertisements on legitimate websites can lead to drive-by downloads of ransomware when clicked.
  • Exploit Kits: These are toolkits that target vulnerabilities in software like your operating system, browser, or plugins. Visiting a compromised website can result in an exploit kit delivering ransomware.
  • Infected Software: Downloading and installing software from untrusted sources can result in unintentionally installing ransomware.
  • Remote Desktop Protocol (RDP) Vulnerabilities: If RDP is not properly secured, attackers can exploit vulnerabilities to gain remote access to your system and install ransomware.
  • Software Vulnerabilities: Outdated software can have security vulnerabilities that attackers can exploit to install ransomware.
  • Malicious Macros: Opening infected Microsoft Office documents with macros enabled can lead to ransomware execution.
August 11, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.