Home Malware Programs Ransomware jundmd@cock.li Ransomware

jundmd@cock.li Ransomware

Posted: January 17, 2019

The jundmd@cock.li Ransomware is a file-locking Trojan that may block digital media in different locations, such as your Downloaders folder or desktop. Because its encryption method is unknown and may not be breakable without the threat actor's private key, the users should depend on robust backup strategies for keeping their files preserved from its attacks. Any traditional anti-malware tool should delete the jundmd@cock.li Ransomware before it attacks, or can uninstall it safely afterward as needed.

Just a Trojan Testing Out Its ExtortionTactic

Some enterprising threat actor is developing a new file-locking Trojan that, like most of its kind, attacks Windows environments. The program's general-purpose attacks are hamstrung from causing widespread data damage intentionally while it finishes its development currently, although the Trojan is, in most respects, a polished and threatening piece of software. The finished version of the jundmd@cock.li Ransomware, which malware experts anticipate seeing soon, should boast a payload that's all but indistinguishable from that of the notorious Hidden Tear.

The jundmd@cock.li Ransomware is being uploaded to AV databases with the ambiguous executable name of 'hert,' seemingly, for testing its detection rates against the major security software vendors. After the user installs it, the jundmd@cock.li Ransomware sweeps the PC's drives for files matching formats of important media, such as PDF documents or JPG pictures, and locks them with an encryption algorithm not yet known to malware experts. The victims have little to fear from these earliest builds of the Trojan relatively, which target only a 'test' folder.

The jundmd@cock.li Ransomware adds its e-mail address into the names of the files that it encrypts and creates a small, Notepad message that contains brief instructions on negotiating with the threat actor. However, any users considering such drastic steps should maintain awareness of the dangers of paying cryptocurrencies or vouchers without getting an unlocking service. Victims without other options should contact a trusted AV community researcher or organization for their help on a decryption analysis that could restore their media.

Staying Out of the Early Days of New Trojan Attacks

It's too soon to do more than guess at what infection methods the jundmd@cock.li Ransomware might use for compromising PCs and, in turn, their documents, images, databases and other media. Some of the standard protections that malware experts suggest taking against file-locking Trojans including disabling your browser's script-based content, not downloading files from unsafe sources like torrent networks, using secure network logins and port settings, and being careful around e-mail attachments. Fortunately, a majority of AV vendors are detecting the jundmd@cock.li Ransomware in its earliest stages without issues.

With Trojans wielding most encryption standards with data-blocking motivations, all users' media is at risk, so long as there isn't an unencrypted backup. Backing up work to other devices is recommended heavily, although, in rare cases, the Shadow Volume Copies may be available in less-thorough infections taking place in a Windows environment. Having local anti-malware protection should suffice for removing the jundmd@cock.li Ransomware before the encryption routine begins.

At this time, most anti-malware services aren't struggling against identifying the jundmd@cock.li Ransomware, which has features that malware experts see in thousands of similar Trojans. Since, however, the future of one program's development isn't easily predictable, Windows users shouldn't stop taking to heart the importance of having a 'safety first' lifestyle while browsing the Web.

Loading...