BlackJockerCrypter Ransomware
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 100 % (High) |
Infected Computers: | 3 |
First Seen: | March 27, 2017 |
Last Seen: | August 17, 2022 |
OS(es) Affected: | Windows |
The BlackJockerCrypter Ransomware was first observed on March 20, 2017, and is an encryption ransomware Trojan designed to force computer users to pay large ransoms to recover their files, which the BlackJockerCrypter Ransomware takes hostage. The BlackJockerCrypter Ransomware receives its name from the email address used by con artists to contact the victims. The BlackJockerCrypter Ransomware belongs to a large ransomware family that includes the Globe V3 ransomware engine. The threats in this family tend to be effective in bypassing many anti-virus programs and detection methods on targeted computers.
This BlackJocker will Mess Up the Game
The BlackJockerCrypter Ransomware's main intended victims are small businesses, as well as business networks and servers. The BlackJockerCrypter Ransomware also is designed to carry out an effective attack against individual computer users. The BlackJockerCrypter Ransomware may be delivered in the form of corrupted attachments contained in phishing emails. A common example of tricking emails used in these attacks include bogus job applications, which have a corrupted attachment disguised as a CV. This is a tactic that PC security researchers have observed in other attacks. The BlackJockerCrypter Ransomware uses the AES 256 encryption to make the victim's files completely inaccessible, encrypting numerous file types that may include media files, databases, and various documents. The BlackJockerCrypter Ransomware changes the files' names substantially, rather than simply adding an extension like many other ransomware Trojans. The BlackJockerCrypter Ransomware will change the files' name using the following model:
[blackjockercrypter@gmail.com].[Random identifying characters].happydayzz
The files encrypted by the BlackJockerCrypter Ransomware become inaccessible. The BlackJockerCrypter Ransomware delivers its ransom note in the form of a program window named 'How To Recover Encrypted Files.' This ransom note includes the following text:
'YOUR FILES ARE ENCRYPTED!
Contact Us
Email: blackjoclcercrypter@gmail.com
Skype: nsyaneksab.aked
All your files have been encrypted due to a security problem with your PC.
To restore all your files, you need a decryption.
If you want to restore them, write us to the e-mai blackjockercrypter@gmai.com .
In a letter .
You have to pay for decryption in Bitcoins.
The price depends on how fast you write to us.
After payment we will send you the decryption tool that will decrypt all your files.
In the letter, you wi receive instructions to decrypt your files!
In a response letter you will receive the address of Bitcoin-wallet, which is necessary to perform the transfer of funds.
Our tech support is available 24 \ 7
• Write on e-mail, we will help you!
Free decryption as guarantee
Before payng you can send to us up to 2 fies for free decryption.
Please note that files must NOT contain valuable information and their total see must be less than 5Mb.
When the transfer is confirmed, you wl receive interpreter files to your computer.
After start-interpreter program, all your files wi be restored.
Attention!
• Do not rename encrypted fifes.
• Do not try to decrypt your data using thrd party software, it may cause permanent data loss.
• Decryption of your fies with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
• Do not attempt to remove the program or run the anti-virus tools
• Attempts to self-decrypting files wi result in the loss of your data
• Decoders are not compatible with other users of your data, because each users unique encryption key'
Dealing with a BlackJockerCrypter Ransomware Infection
PC security researchers strongly advise computer users to refrain from paying the BlackJockerCrypter Ransomware ransom, since these people may ignore the payment or ask for even more money. Instead, computer users are advised to use backup copies of the files to restore the affected data. A reliable security program that is fully up-to-date can help intercept the BlackJockerCrypter Ransomware attack before it causes lasting damage to the infected computer. As with most ransomware Trojans, having file backups is the most effective protection against these threats.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.