Home Malware Programs Ransomware jHEAc Ransomware

jHEAc Ransomware

Posted: June 5, 2020

The jHEAc Ransomware is a new file-locker that does not share code with previously known ransomware families, so it appears to be the product of an independent malware developer. Unfortunately, the crooks behind the jHEAc Ransomware is likely to have some experience in the hacking field since they have managed to create a file-locker whose encryption routine cannot be cracked or reversed – this makes the recovery of files locked by the jHEAc Ransomware a very difficult task.

When the jHEAc Ransomware infiltrates a system, it will encrypt a wide variety of file formats, and then mark their names with the '.jHEAc' extension. It also drops a ransom message by using the file 'JHEAC-HOW-TO-FIX.txt.' Usually, ransomware operators ask to be contacted via email, but the author of the jHEAc Ransomware appears to want to be messaged by using a social media platform called Licky.org. It is not clear why they have opted for this unconventional method of communication. In case the user fails to register for Licky.org, they can also contact the attacker by using the email hacker47817628648971@airmail.cc.

The jHEAc Ransomware Authors Use an Unpopular Social Media to Contact Their Victims

You should not expect to receive any help from the jHEAc Ransomware's authors for free – even if you contact them, you are likely to be asked to pay a hefty ransom fee if you wish to receive any assistance from them. Of course, you should not accept to send money to anonymous cybercriminals that have not given you a single reason to trust them – even if you try to co-operate with jHEAc Ransomware's author, you may end up losing both your money and your files.

If the jHEAc Ransomware is preventing you from accessing your files, then we suggest that you start their recovery by running an anti-virus software suite that will ensure the full removal of the file-encryption Trojan. After the jHEAc Ransomware is gone for good, you can proceed to use popular data recovery software and methods.

Loading...