Threat Database Ransomware Jasa Ransomware

Jasa Ransomware

Cybersecurity experts have recently identified a ransomware variant named Jasa. This particular form of malware employs file encryption to effectively bar users from accessing their files, adding the '.jasa' extension to the filenames. For example, if a file like '1.jpg' were affected by Jasa, it would become '1.jpg.jasa' after encryption.

Beyond its file encryption capabilities, Jasa also generates a ransom note that takes the form of the '_readme.txt' file. This note typically includes instructions detailing the ransom payment process in exchange for the decryption key. Jasa belongs to the STOP/Djvu Ransomware family, a group that cybercriminals are known to distribute alongside other harmful threats, such as Vidar or RedLine.

Notably, Jasa is recognized for encrypting a wide array of file extensions, including but not limited to .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pdf, .jpg, .jpeg, .png, and .bmp. The propagation of Jasa commonly occurs through corrupted links, spam emails and cracked software. Upon infecting a device, the malware promptly initiates the encryption process.

The Jasa Ransomware Locks Files and Demands Ransom Payments

The ransom note put forth by the threat actors outlines their demands, primarily indicating that victims must pay them a specific sum of money as a ransom. To initiate the data restoration process, victims are directed to get in touch with the assailants via the supplied email addresses, specifically 'support@freshmail.top' or 'datarestorehelp@airmail.cc.' Upon establishing communication, victims will be furnished with further instructions on how to progress with fulfilling the ransom payment.

Within the ransom note, two distinct sums are presented: $980 and $490. Supposedly, victims are entitled to the discounted rate if they establish contact with the assailants within a stipulated window of 72 hours.

Researchers strongly advise against surrendering to the assailants' ransom demands. Such actions carry considerable hazards and provide no assurance of successfully recovering the locked data. Engaging in these transactions can result in potential financial losses without any guarantee of restoring the impacted data.

Furthermore, it is of paramount importance for victims to take immediate measures to eliminate the ransomware from their systems. This action is imperative to halt further data loss that may arise due to additional encryption activities conducted by the ransomware.

Ensure the Security of Your Devices and Data

Protecting data and devices from ransomware infections requires a comprehensive approach that combines technical safeguards, user education, and proactive measures. Here's a detailed explanation of how users can safeguard their data and devices from ransomware:

  • Regular Backups: Regularly back up all important data to an external or cloud-based storage solution. Ensure backups are not directly connected to the network or device to prevent them from being compromised during an attack. This allows you to restore your data if it gets encrypted by ransomware.
  •  Update Software: Keep operating systems, applications and security software updated with the latest patches. Ransomware usually exploits known vulnerabilities in outdated software.
  •  Install Anti-Malware: Use reputable anti-malware software to detect and block ransomware threats. Keep these security tools updated for optimal protection.
  •  Educate Users: Train yourself and others on how to recognize phishing emails, unsafe attachments and suspicious links. Avoid clicking on unexpected links or downloading files from untrusted sources.
  •  Secure Email Practices: Be cautious of unsolicited emails and attachments, especially those urging urgent action. Verify the sender's identity before clicking on any links or downloading attachments.
  •  Use Strong Passwords: Use complex passwords and consider using a password manager. Multi-Factor Authentication (MFA) includes an extra layer of security to your accounts.
  •  Block Macros: Disable macros in office applications, as ransomware often uses macros to initiate attacks through malicious documents.
  •  Secure Remote Desktop: If using Remote Desktop Protocol (RDP), secure it with strong passwords, enable network-level authentication and restrict access to trusted IPs.
  •  Stay Informed: Look for the latest trends in ransomware and cybersecurity so you can adapt your protection strategies.

By implementing these measures and fostering a security-conscious mindset, users can significantly reduce the risk of becoming victims to ransomware attacks and protect their devices and data from potential harm.

The ransom note dropped by Jasa Ransomware contains the following text:

'ATTENTION!

Don’t worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
https://we.tl/t-oTIha7SI4s
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.

To get this software you need write on our e-mail:
support@freshmail.top

Reserve e-mail address to contact us:
datarestorehelp@airmail.cc'

Trending

Most Viewed

Loading...