Summary
Jemd is a ransomware tool first seen in December 2018.
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication it is unclear how Jemd is distributed, but as with most ransomware it is likely to be delivered in spam or malvertising campaigns.
When Jemd executes it attempts to encrypt the user's files, and then saves a ransom note onto the affected system. Security researchers have reported that the encryption process does not operate as intended, resulting in data loss instead.
Remediation steps
| Type | Step |
|---|---|
|
At the time of publication, Jemd does not delete shadow volume copies or system restore snapshots. It is therefore likely that these facilities may be used to restore access to affected data. If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
Last edited: 14 February 2020 2:50 pm