Jokers House Ransomware
Posted: May 1, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 145 |
First Seen: | May 1, 2017 |
---|---|
Last Seen: | September 11, 2021 |
OS(es) Affected: | Windows |
The Jokers House Ransomware is a variant of the Jigsaw Ransomware, a Trojan that locks your files by encrypting them and uses pop-ups for selling the threat actor's unlocking solution. This family of file-encrypting Trojans is notable for deleted files on an ongoing basis particularly and always should be disabled as soon as possible after an infection. Various anti-malware solutions can block the Jokers House Ransomware or remove the Jokers House Ransomware after it installs itself, whereas non-local backups can assist with data recovery.
Trojans Laughing at Your Computer's Expense
While it's not the most prolifically distributed of threats, the Jigsaw Ransomware's campaign is responsible for a unique degree of dread of potential file damages that victims don't experience with its competition. Another release of this Trojan is just detectable in the wild, now: the Jokers House Ransomware, which includes both the data-locking and erasing features of the original program. Its threat actors also are taking cues from other threat families by using their extensions for communicating portions of their ransoming demands.
Circulating samples of the Jokers House Ransomware are verifiable since late April. Malware researchers are finding current installers for the Jokers House Ransomware using exploits to mimic software registration-cracking utilities that victims might find on illicit freeware sites or torrent networks. After being introduced to the system, the Jokers House Ransomware encrypts content, such as documents and JPG images, to keep them from opening.
Any unusable files are visible readily, thanks to the filename changes that append the '.Contact_TarineOZA@Gmail.com_' extension after any preexisting format tags. This modification supplements the Jokers House Ransomware's ransom note, which it launches in a pop-up similar to that of the original Jigsaw Ransomware. Like its ancestor, the Jokers House Ransomware also asks for Bitcoin money to decrypt your files, but its authors are distributing the Jokers House Ransomware themed after the Batman franchise's most famous villain, the Joker, instead of the Saw movie references of prior attacks.
Stopping a Bad Comedy from Hurting Anyone
The Jokers House Ransomware continues the showmanship of its ancestor by loading its pop-up with a combination of gradually-revealed text and a countdown ticker until it begins erasing your encrypted content. Unlike most file-encryption Trojans, malware experts can verify that the Jigsaw Ransomware and its derivatives will follow up on their threats and delete your media permanently. This attack places any victims under the restraint of time pressure to resolve the infection, whether by paying the ransom or disinfecting the PC before the Jokers House Ransomware can remove too many files.
Because of the particular data preservation risks of this Trojan's family, compromised PCs should avoid being rebooted or otherwise tampered with until you can be sure of disabling the threat securely. Malware experts recommend restarting your PC through a peripheral device to guarantee that you don't load the Jokers House Ransomware while launching Windows. Many brands of anti-malware products should be able to uninstall the Jokers House Ransomware, although recovering encrypted content may require having a previous backup.
Although the Jokers House Ransomware's infection method of choice isn't the favorite one for most file-encrypting Trojans, downloading software and software cracks from risky sources is no less threatening than it was in past years. PC users unable to resist such temptations have yet another reason to consider the investment of thorough backup resources lest the Jokers House Ransomware get the last laugh.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.