Home Malware Programs Ransomware JobCrypter Ransomware

JobCrypter Ransomware

Posted: February 15, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 5
First Seen: February 15, 2016
Last Seen: March 6, 2020
OS(es) Affected: Windows

The JobCrypter Ransomware is a file encrypting Trojan that modifies your data, blocking you from using it, until you pay a set ransom amount to its administrators. You can prevent most file encryptors from causing irrecoverable damage with the intelligent use of backups. However, no matter what the nature of your encrypted data is, you should strive for removing the JobCrypter Ransomware with appropriate anti-malware products and supporting techniques, just as malware experts recommend for any advanced threat.

The Trojan with the Job of Taking Your Files Away

Even though malware researchers see new variants of file encryptors regularly, these threats often concentrate their campaigns on English-speaking regions. The JobCrypter Ransomware bucks this trend by using ransom notes meant for residents of France, and includes ransom methods compatible with the general Euro area. Other than this differences in its choices of targets, the JobCrypter Ransomware shows features familiar to past file encryptors like TeslaCrypt or the CryptPKO Ransomware.

After its installation succeeds, the JobCrypter Ransomware examines any hard drives for files not related to your operating system. Examples of some of the JobCrypter Ransomware's possible attack targets include TXT, JPG, DOC, or XLS. Once the JobCrypter Ransomware finds relevant data, the JobCrypter Ransomware runs an encryption routine that modifies the internal structure of each file, similar to the compression process of a ZIP archive. Any encrypted information is no longer readable. For the sake of identification, the JobCrypter Ransomware also adds tags to their names: the '.locked' extension.

With its encryption accomplished, the JobCrypter Ransomware generates a final TXT file on your hard drive: its ransom note. Its admins demand a 300 Euro (approximately 334 USD) fee in return for decrypting all of your information while also offering a single, 'free' decryption to prove that they can do so. Its payment method uses PaySafeCard coupled with e-mail communications; malware experts also have seen some evidence of its possessing a custom Web page-based form.

Firing the JobCrypter Ransomware from Your Hard Drive

Decrypting the files modified by the JobCrypter Ransomware requires its key, which is custom for each PC. Until PC security researchers make free decryptors available, your local data may be irretrievable without paying the JobCrypter Ransomware's con artists, which malware experts can't endorse. However, non-local file backups, including both Web storage servers and removable devices (USB or DVD) can offer your information a haven away from the JobCrypter Ransomware's encryption attacks.

Whether or not they have available means for salvaging their encrypted data, deleting the JobCrypter Ransomware should be the priority of any victim. Symptoms of a JobCrypter Ransomware infection (such as the presence of any '.locked' files or ransom messages) are high-visibility attacks. After you see these attacks, reboot your computer and use the Safe Mode feature (available to all modern OSs) to launch with a minimum of running programs. Then scan your system with your anti-malware product of choice.

While anti-malware resources can detect and remove the JobCrypter Ransomware with reasonable ease, the process of decrypting information is a separate feature not bundled with most anti-malware packages. Since con artists still are relying on threats like the JobCrypter Ransomware over the coming year, backing up your data is as important as ever.

Related Posts

Loading...