Remove Xorist Virus – Restore .PrOtOnIs Files

Xorist Virus image ransomware note .PrOtOnIs  extension

A new Xorist virus sample has been detected using the .PrOtOnIs extension. We have detected that it is based on the source code used by previous iterations. Our in-depth removal article shows how the threat operates and how the victims can delete active infections and restore their computers.

Threat Summary

NameXoris Virus
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .PrOtOnIs extension and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Xoris Virus

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Xoris Virus.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Xorist Virus – Distribution Ways

The Xorist ransomware family is well known for spreading across a variety of different methods. The recently collected Xorist virus samples indicate that computer criminals continue to develop new threats that utilize the same underlying engine.

A common tactic used to spread the virus samples is the creation of phishing email campaigns. They mandate the coordination of messages that contain design elements and layouts that are hijacked from popular services and sites that most Internet users might use. Usually the Xorist virus samples are either directly attached or linked somewhere in the body contents.

The built-in links can lead to hacker-created sites that might look like legitimate vendors or download portals. In most cases it may be difficult to differentiate between the (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Martin Beltov. Read the original post at: