Thanks to the experts at Emsisoft the victims of the JSWorm 4.0 ransomware can decrypt their files for free.
Like previous versions of the malware, the JSWorm 4.0 ransomware is also written in C++ and uses a modified version of AES-256 to encrypt files.
The malicious code adds the extension “.[ID-][].JSWRM to the filenames of encrypted files. Once encrypted all data it drops the ransom note “JSWRM-DECRYPT.hta” using the following text:
"JSWRM 4.0.2 Your files are corrupted! Identificator for files: [redacted] E-mail for contact: symmetries@tutamail.com Backup e-mail for contact : symmetries0@tutanota.com Free decryption as guarantee! Before paying you can request free decryption of 3 files. Total size of files must be less than 5MB (non-archived). Files shouldn't contain valuable information (accept only txt\jpg\png). Attention! Don't try to decrypt it manually. Don't rename extension of files. Don't try to write AV companies (they can't help you). "
Emsisoft release the detailed usage guide for the decryptor that is available here.
In May Emsisoft experts released a free Decrypter tool for the JSWorm 2.0 variant.
In July the company released other free decryptors for the LooCipher ransomware, the ZeroFucks ransomware, and the Ims00rry ransomware.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – JSWorm, ransomware)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.