Home Malware Programs Ransomware JCandy Ransomware

JCandy Ransomware

Posted: November 14, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 2
First Seen: April 20, 2021
OS(es) Affected: Windows

The JCandy Ransomware is a Trojan that can block your files and display pop-ups asking you to pay for an unlocking solution. Threats using cryptography in their payloads suffer significant limitations with any victims who have previous backups, especially ones in secure locations that the Trojan can't encrypt or delete. Your anti-malware products should identify and remove the JCandy Ransomware as a threat to both your PC's security and your media.

The Computer Misdeed with a Candy Coating

A rare file-locking Trojan that's not an immediate derivative of families like the CryptMix Ransomware or EDA2 is just being caught by malware researchers and other security industry analysts, as of mid-November. The Trojan, the JCandy Ransomware, employs advanced GUI pop-ups for communicating with its victims while also locking their files via encryption. Although the JCandy Ransomware asks for an upfront price of 200 USD value, it's not yet verifiable whether or not paying the ransom gives the user access to a real, file-unlocking service.

The JCandy Ransomware is a Windows-only Trojan that, in some cases, circulates in compressed archives that obfuscate the corrupted executable. After the user installs it, the JCandy Ransomware loads a background process that searches the PC's folders for documents, pictures, and other formats of media for encrypting. Malware experts estimate that the JCandy Ransomware is using an AES-based cipher, although further investigation is needed to determine whether or not third-party software could reverse the encoding attack. As usual, all files that the JCandy Ransomware encrypts will not open in related programs, which provide the Trojan's threat actor with a bargaining position for demanding a ransom.

The second, significant function that the JCandy Ransomware carries out is launching a pop-up window using an advanced HTML format, which allows the UI to include buttons and interactive text fields. This window carries the threat actor's demand for 200 USD in Bitcoins and a fake Bitcoin-purchasing button that, instead, redirects the users to an image-hosting service recommending that they 'Google it.' As noted previously, malware experts have yet to corroborate any bundled decryption or payment-verifying features in the Trojan that would allow the victims to restore their files after paying theoretically.

Teaching Your Computer to Digest Healthier Things than Trojans

For the time being, malware researchers have yet to determine infection strategies that might circulate or install the JCandy Ransomware onto new PCs, and only can estimate that its ransom-collecting strategies are most appropriate for recreational or casual users, instead of corporate networks. The JCandy Ransomware's author also appears to be testing the obfuscation of this Trojan's code against common AV solutions, with multiple, undisguised samples arriving in centralized threat databases within a short time. Updating your anti-malware solutions when appropriate can help them keep abreast of newly-developed threats like the JCandy Ransomware.

Installation tactics for file-locking threats often, but not exclusively, use e-mail attachments to gain a foothold on a vulnerable PC. Since a successful infection can damage your files with encryption that may be irreversible, keeping backups of any essential work on another device is heavily recommended as a precaution. Updated anti-malware software should eliminate the JCandy Ransomware immediately and before it starts to lock any files.

The JCandy Ransomware is the newest but hardly unique example of a Trojan attacking the data of Windows users to make cryptocurrency off of their work. Working 'smart,' rather than 'hard,' pays off for con artists just as well as for a legal employee, which makes standard security procedures, anti-malware protection, and backup scheduling into necessities for anyone with a PC.

Loading...