Home Malware Programs Ransomware JungleSec Ransomware

JungleSec Ransomware

Posted: June 20, 2018

The JungleSec Ransomware is a file-locker Trojan that uses encryption to keep your documents and other media from opening and may implement additional features, such as changing your desktop or removing backups. Although most Trojans in this category are for Windows, malware experts only are seeing the JungleSec Ransomware attacks against Linux-based PCs. Keep backups on another device for restoring your media, and choose a trusted brand of anti-malware product for deleting the JungleSec Ransomware securely.

Linux Gets Its Turn as a Trojan Target

The relative rarity of Linux-specific Trojan development shouldn't lead to Linux fans assuming that their OS is immune to spyware, harmful encryption or other attacks related to their Black Hat software industry. As evidence of this vulnerability, malware experts are showcasing the JungleSec Ransomware, a recently-detectable Trojan whose payload uses Linux-specific components. In other areas, this file-locker Trojan conducts the traditional tactic of encrypting data, pretending to sell a decryptor, and taking the money without compensating its victims.

After its installation, the JungleSec Ransomware uses an unknown encryption method, such as XOR or AES-256, for locking different formats of media automatically. The JungleSec Ransomware also places a new '.jungle@anonymousspechcom' extension at the end of the names of the files, which references the ransoming negotiations it promotes later. For the time being, malware researchers aren't able to ascertain whether the encrypting feature is secure or breakable by third-party software.

With the complete lock-down of all media, the JungleSec Ransomware creates a Markdown (or MD) text file that contains its ransoming instructions. The JungleSec Ransomware's threat actor uses a Bitcoin payment process priced at 0.3 BTC, or just under two thousand USD, at current rates. However, the threat actor's history already has confirmation of taking the money without giving a file-unlocking service back; meanwhile, the victim is unable to retrieve the spent money, due to the cryptocurrency's limited refunding options.

Hauling Your Files Back Out of the Jungle

While the ransoming message that the JungleSec Ransomware drops uses English text, its frequent and blatant grammar issues increase the probability of its threat actor being of a non-native speaker who's making use of automatic translation services. Attacks from this threat's campaign are limited in number, and malware experts can't identify any of its infection methods clearly, for now. However, spam e-mails, brute-force attacks versus network logins, and unsafe downloads from torrents are some of the techniques in play for file-locking Trojans in this year.

Since decrypting any files that a threat of the JungleSec Ransomware’s category locks is, frequently, impossible, users should implement security features for compartmentalizing their valuable media. Detachable devices and cloud services are secure against these attacks frequently, although many file-locking Trojans do use various methods for compromising other PCs over any local networks. Active anti-malware programs may delete the JungleSec Ransomware before its installation and should disallow its data-encrypting routine from loading.

Not putting all your eggs in one basket is often a good thing, even from a software perspective. Sadly, there's no 'basket' that's safe from criminals with sufficient interest in the contents, which is why relying on backups for threats like the JungleSec Ransomware is better than hoping that your operating system will grant you de facto immunity to them.

Loading...