Threat Database Ransomware Kjh Ransomware

Kjh Ransomware

By GoldSparrow in Ransomware

Another file-locking Trojan has been uncovered by malware researchers. It was given the name Kjh Ransomware, and when they studied the threat, it became apparent that this seemingly new ransomware threat is a variant of the popular Dharma Ransomware.

It has not been confirmed what propagation methods are employed in the spreading of the Kjh Ransomware, although it seems that the authors of this data-encrypting Trojan have chosen to employ fraudulent updates, infected pirated content and spam email campaigns. When the Kjh Ransomware infects your system, as a first step of the attack, it will start scanning it. The purpose of the scan is to identify the locations of the files, which will later be encrypted. Having completed this step, the Kjh Ransomware would begin the encryption process. When a file undergoes the encryption process of the Kjh Ransomware, it will have its name altered. The Kjh Ransomware adds a new extension at the end of the filename following the pattern - '.id-.[datareturn@protonmail.com].kjh,' which is a typical move for a threat that belongs to the Dharma Ransomware family. Then, the Kjh Ransomware proceeds to drop a ransom note. The note is named 'RETURN FILES.txt.' To ensure that the victim will not somehow miss their ransom note, ransomware authors often use all caps when naming the note. In the note, it is not mentioned what the required ransom fee is, but the authors insist on being contacted via email on their email address – datareturn@protonmail.com.

It is never recommended to get in touch with cyber crooks as it may end up costing you dearly. Instead, you should make sure to obtain a reputable anti-malware application and wipe the Kjh Ransomware off your system.

Trending

Most Viewed

Loading...