New born in the family of ransom software, Jigsaw threatens to permanently delete files from his victims. Solutions nevertheless allow rendered ineffective.
It is named after a character in a horror movie, and it’s not without reason. Recently discovered by several IT vendors, the ransomware (or “rançongiciel”) Jigsaw does not just encrypt data. Released through download sites or pornographic sites, it also threatens to permanently delete files if the victim refuses to pay a ransom.
This malware first deletes a file after an hour and increases the number of deletions every hour. The amount of the ransom initially set, equivalent to 150 dollars in bitcoin, also increases progressively. In the absence of payment, the encrypted files are deleted after 72 hours. If the victim off his computer, it runs the risk of losing files. “Try to try something fun and computer apply security measures to destroy your files,” warns the message.
“As terrifying as it is, based on a very Jigsaw structure easy “, explain specialists TrendMicro. Researchers have already found the solution to counter this new software. We must open the Windows Task Manager and close your firefox.exe process and drpbx.exe created by ransomware. You must then open Windows MSConfig and delete the boot entry AppDataRoamingFrfxfirefox.exe% UserProfile%, which will stop the destruction process. Last step:. Jigsaw Decrypter install a free software offered by BleedingComputers.com and to decrypt the data
Jigsaw joins the family of ransomware, very active in recent months, partly to be the main threat to computer the year. Furthermore Locky, who has targeted Agence France Presse and Free Mobile subscribers, this family has seen the arrival of early April Petya, software able to completely block a computer in addition to hijack the data. While these ransomware usually diffuse through fraudulent mails, it remains unclear how Jigsaw is installed. To avoid these disappointments, security software vendors offer to make a regular backup of their data to external storage media. But they point out that the perpetrators of these attacks are continuously adapting their technique.
No comments:
Post a Comment