Pr1ncess Locker Ransomware-as-a-Service
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
As with most other MaaS tools, Pr1ncess Locker can be distributed in which ever way an affiliate sees fit, but has been observed being delivered primarily via exploit kit or spam campaigns.
Once on a device, Pr1ncess Locker will attempt to delete Shadow Volume Copies and other backup files before encrypting all local non-system files that match a list of targeted extensions. Most variant use AES-128 encryption although newer versions may use AES-256.
For further information
Threat updates
| Date | Update |
|---|---|
| 16 Aug 2018 | p>A new variant of Pr1ncess Locker has been discovered called Princess Evolution, which is also being sold as a service. The malvertisements involved in this campaign also attempt to mine cryptocurrency on affected devices. |
Remediation steps
| Type | Step |
|---|---|
|
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
CVE Vulnerabilities
Last edited: 17 February 2020 12:52 pm