Home Malware Programs Ransomware Jemd Ransomware

Jemd Ransomware

Posted: December 19, 2018

The Jemd Ransomware is a file-locker Trojan that encrypts your files for blocking them until you agree to pay its ransom, with data types like documents, images or archives being at risk especially. Although bugs in the Jemd Ransomware prevent the decryption and recovery of any locked data, the users should be capable of restoring via both Windows default and external backups. Let your preferred anti-malware solution remove the Jemd Ransomware beforehand for stopping any more files from being corrupted.

A Trojan Family Grows a Real Gem of a Trojan

There may be a new variant of the Delphimorix Ransomware in production, as malware researchers are confirming evidence of a file-locker Trojan with strong similarities to the Gerber Ransomware member of that family. The threat actor responsible for this update, however, isn't the original author apparently and includes a variety of technical missteps. The programming errors in the Jemd Ransomware, unfortunately, only multiply the problems of any victims.

The Jemd Ransomware claims that it uses AES for locking the user's media, although the family it bears the greatest reminiscence to is notable for preferring the rarer RC6 algorithm. Whether or not its ransoming message is lying, the Jemd Ransomware can lock various file formats in multiple directories, such as Word or PDF documents, ZIP or RAR archives, and the contents of the desktop. As with most file-locking Trojans that malware experts see, the Jemd Ransomware is for a Windows environment.

All the versions of the Jemd Ransomware available to malware experts, also, contain multiple, severe programming errors. Unfortunately, none of them hinder its ability for damaging files, and, in fact, one of them improves it unintentionally: by overwriting an incorrect portion of the file's internal data, which makes the decryption solution impossible. On the other hand, the Jemd Ransomware also doesn't erase the Shadow Volume Copies, and the users can resort to the Windows' System Restore feature for getting everything back.

Tending to the Collateral Damage that a Few Bugs can Cause

Windows users may not be aware of the operating system's not defaulting to creating Restore Points for recovering data easily after unwanted system changes, although automating the process is straightforward for those choosing to do it. However, even in such cases, file-locking Trojans very similar to the Jemd Ransomware may not be impeded, since many of them, such as the Scarab Ransomware and the Globe Ransomware families, will delete the Shadow Volume Copies and make the Restore Points unavailable.

Surprisingly, most AV products aren't detecting the Jemd Ransomware, and most of those that are doing so are employing heuristic identifiers. The users should update their anti-malware products' databases for guaranteeing optimal accuracy and stay aware of the current infection vectors, such as spam e-mails, Word macros, browsers running corrupted JavaScript content, and related attacks. Dedicated anti-malware solutions, still, should be the preferred method for uninstalling the Jemd Ransomware for the average user.

One would hope that problems in Trojan functions would mean less harmful results for the people it attacks, but that isn't always the case. The Jemd Ransomware, and similar incidents like the exception-throwing EnybenyCrypt Ransomware and members of the AES-Matrix Ransomware family, are a long-term showing off of how iffy programming never translates to safer cyber-crime.

Loading...