Thanks to the experts at Emsisoft the victims of the JSWorm 4.0 ransomware can decrypt their files for free.
Like previous versions of the malware, the JSWorm 4.0 ransomware is also written in C++ and uses a modified version of AES-256 to encrypt files.
The malicious code adds the extension “.[ID-][].JSWRM to the filenames of encrypted files. Once encrypted all data it drops the ransom note “JSWRM-DECRYPT.hta” using the following text:
"JSWRM 4.0.2 Your files are corrupted! Identificator for files: [redacted] E-mail for contact: symmetries@tutamail.com Backup e-mail for contact : symmetries0@tutanota.com Free decryption as guarantee! Before paying you can request free decryption of 3 files. Total size of files must be less than 5MB (non-archived). Files shouldn't contain valuable information (accept only txt\jpg\png). Attention! Don't try to decrypt it manually. Don't rename extension of files. Don't try to write AV companies (they can't help you). "
Emsisoft release the detailed usage guide for the decryptor that is available here.
In May Emsisoft experts released a free Decrypter tool for the JSWorm 2.0 variant.
In July the company released other free decryptors for the LooCipher ransomware, the ZeroFucks ransomware, and the Ims00rry ransomware.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – JSWorm, ransomware)
[adrotate banner=”5″]
[adrotate banner=”13″]
Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…
Microsoft found 394,000 Windows systems talking to Lumma stealer controllers, a victim pool that included…
CISA warns Russia-linked group APT28 is targeting Western logistics and tech firms aiding Ukraine, posing…
Cellcom, a regional wireless carrier based in Wisconsin (US), announced that a cyberattack is the…
Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…
This website uses cookies.