JSWorm: A Notorious Ransomware

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News

 

The ransomware threat environment has been shifting over the last few years. Following the major ransomware outbreaks of 2017, such as WannaCry, NotPetya, and Bad Rabbit, many ransomware actors have switched to the covert yet the lucrative strategy of “big-game hunting.” The news of ransomware triggering a service interruption at a multinational enterprise has become commonplace. 
Since the discovery of JSWorm ransomware in 2019, numerous variants have gained popularity under various names such as Nemty, Nefilim, Offwhite, and others. As part of each “rebranded” edition, several versions were released that changed various aspects of the code, renamed file extensions, cryptographic schemes, and encryption keys. 
JSWorm is a ransomware variant of the GusCrypter malware family. Its purpose is to extort money from victims by encrypting all personal data and requesting a ransom for the decryption key. It’s a member of the GusCrypter clan. JSWorm is typically transmitted via spam email attachments. 
The malware also leaves a ransom note, JSWORM-DECRYPT.html, instructing victims to contact criminals via the NIGER1253@COCK.LI email address if they want their data back. Since JSWorm belongs to a well-known ransomware family, it’s possible that the encryption will be permanent. 
Although JSWorm ransomware does not encrypt system files, it does modify your system in other ways. As a result of the altered Windows Registry values, ransomware is launched every time the user restarts the device. These modifications, however, are made after the encryption and ransom demand h

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: JSWorm: A Notorious Ransomware