Home Malware Programs Ransomware Dr Jimbo Ransomware

Dr Jimbo Ransomware

Posted: June 21, 2016

Threat Metric

Ranking: 11,688
Threat Level: 8/10
Infected PCs: 2,759
First Seen: June 21, 2016
Last Seen: October 8, 2023
OS(es) Affected: Windows

The Dr Jimbo Ransomware is a file encrypting Trojan that may target dedicated servers, but also can impact personal-use computers. Its attacks continue with the standardized abuse of the encryption technology for blocking the machine's owner from any local files not required by the OS, with its con artists asking for Bitcoin ransoms to undo the Trojan's ill effects. Keeping a resilient system of backups and using anti-malware tools for uninstalling the Dr Jimbo Ransomware is, nonetheless, still a better response.

Your Appointment with Bitcoin by Force

By and large, Trojans focusing on encryption as a ransom method tend to be found on machines intended for personal activities or the projects of a single worker. However, innovations in threats aren't only found in their code, but in their philosophy of deployment, including which systems are targeted preferentially. The Dr Jimbo Ransomware shows a possible new era for ransomware-styled threats: attacking network servers.

The Dr Jimbo Ransomware's payload includes encryption using an unidentified algorithm (most likely a combination of Rijndael and RSA) to modify targeted data formats, excluding essential program ones. The Dr Jimbo Ransomware also appends each file with a new '.encrypted' extension for visual identification. Last, some samples of the Dr Jimbo Ransomware drop individual ransom notes as text messages, while others may generate a new ransom note for every single piece of encrypted data.

These instructions simply ask for e-mail communications on settling on a final Bitcoin price for decrypting your content. However, some the Dr Jimbo Ransomware messages do include threats of a two-day time limit on the ransom process, after which your data will be unrecoverable supposedly. Perhaps most meaningfully of all, malware experts saw some samples of these notes addressing the reader as the operator of a server machine, providing significant clues on the campaign's most likely targets and infection vectors.

Banning a Bad Doctor from Your Serve

Compromises of business systems often start with e-mail spam or weak network login info. Using strong, rotating passwords and scanning unrecognized e-mail attachments are two of the security steps malware experts would rate as most useful for stopping common infection vectors in their tracks. Many e-mail messages intent on delivering threats to business entities will use disguises such as failed delivery invoices or messages specific to the organization's industry.

Although the Dr Jimbo Ransomware's messages do offer to decrypt a file freely as proof of the potential transaction, such 'free samples' do nothing to verify that the con artists will reciprocate any Bitcoin payments in turn. For dealing with most file encryptors, malware experts advise solutions not dependent on the largesse of threat authors. In particular, backups stored on non-compromised drives, including portable devices and cloud services, can make the point of decryption moot.

Even though the Dr Jimbo Ransomware's preferred targets are relatively unorthodox, dealing with it doesn't require any specialized tools beyond those used for most types of harmful file encryptors. Remove the Dr Jimbo Ransomware with your preferred anti-malware solution and restore all files from a backup to make the 'ransom' half of this Trojan's campaign a transaction with all the substance of vaporware.

Loading...