Threat Database Ransomware Jycx Ransomware

Jycx Ransomware

Cybersecurity experts have come across a ransomware variant called Jycx. This type of malware utilizes file encryption to lock users out of their files and appends the '.jycx' extension to their names. For instance, '1.jpg' would become '1.jpg.jycx' after Jycx has encrypted it.

Apart from file encryption, Jycx also generates a ransom note in the form of the '_readme.txt' file. This note usually contains instructions on how to pay the ransom in exchange for the decryption key. Jycx is a member of the STOP/Djvu Ransomware family, which has been known to be distributed by cybercriminals along with other malicious software like RedLine and Vidar.

It is noteworthy that Jycx is known to encrypt a range of file extensions, with some being .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pdf, .jpg, .jpeg, .png, and .bmp. Jycx is typically spread through malicious links, spam emails, and software cracks. Once the malware has infected a device, it immediately starts the encryption process.

The Jycx Ransomware Takes the Victim's Data Hostage

The ransom note left by the attackers leaves victims of the ransomware attack with two email addresses, '' and ',' which they can use to contact the attackers. The note states that victims must reach out to the attackers within 72 hours of the attack to avoid a higher ransom of $980 for decryption tools, as opposed to the initial ransom amount of $490.

According to the ransom note, it is impossible to recover the encrypted data without purchasing decryption software and a unique key from the attackers. The attackers also claim to offer victims the free decryption of a single file, but this file cannot contain any crucial data.

What Steps to Take to Protect Your Devices and Data from Ransomware Threats?

Ransomware is malware that can cause significant damage to a user's device and data. To protect against this threat, users must adopt a proactive approach towards security.

One of the most effectual ways to prevent ransomware attacks is to stay informed about the latest threats and vulnerabilities. Users should educate themselves on the latest tactics used by attackers to spread malware, such as phishing emails, malicious links, and social engineering attacks. They should also keep their anti-malware software up-to-date to ensure it can detect and block new strains of ransomware.

Anothcritical step towards ransomware prevention is to regularly back up data to a secure location. In the event of a ransomware attack, users can restore their files from the backup, reducing the impact of the attack. It is crucial to perform regular backups of all critical data, including important documents, images, and videos.

Users should also be cautious when opening email attachments or downloading files from unknown sources. It is advisable to scan all files with antivirus software before opening them. Users should also avoid clicking on links in suspicious emails or pop-ups.

In conclusion, protecting against ransomware threats requires a multi-layered approach that includes user education, regular backups, updated security software, cautious browsing habits, and a robust security.

The ransom note dropped by Jycx Ransomware is:


Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID':


Most Viewed