Jigsaw ransomware wants to play a game, but not in a good way
Written by a NortonLifeLock employee
An unusual strain of ransomware has shown up on the scene, and it isn’t playing nicely at all. Dubbed “Jigsaw,” the ransomware was created in early March and made its way to the black market a week later, selling for around $140 USD. So far, it seems that there has been minimal sales of the malware. Luckily, it is not widespread yet.
Don’t wait until a threat strikes.
Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device – like most of us do – you need an all-in-one security suite. Meet Norton Security Premium.
Enjoy peace of mind on every device you use with Norton Security Premium.
No Credit Card Required
Ransomware With a Wicked Twist
This is not your average ransomware. Yes, Jigsaw ransomware will encrypt your files and demand a ransom in order to retrieve your files, however Jigsaw comes with a countown timer. Once the malware is deployed, the Jigsaw clock starts ticking. During the first 24 hours it will start deleting a few files every hour. On the second day, the ransomware will delete hundreds of files, on the third day it will delete thousands- until the ransom is paid. Additionally, if you try to tamper with the ransomware or even restart your computer, it will delete 1000 files a “punishment.”
Newer versions of the Jigsaw ransomware don’t use the image of the iconic character anymore, however it is still referred to as Jigsaw.
While ransomware is one of the more problematic threats on the Internet landscape today, there are many ways you can protect yourself from it. By being proactive in your own cyber defense, you can thwart cybercriminals in three easy steps:
- Perform regular backups of your computer. Be sure to unplug the back up drive when not in use.
- Use an Internet security software program to prevent the ransomware from being installed on the computer in the first place. Norton Security protects customers from this particular threat and many other ransomware threats.
- Ransomware and other malware can sneak in through vulnerabilities in software programs. Be sure to perform all software updates when they become available in order to close up the “holes” in your system.
Finally, do not EVER pay the ransom. There’s no guarantee that you will get your files back, and more than anything you are funding the cybercriminals operations further.
Isn't it time to upgrade your security?
Upgrading to new devices and software can often mean downgrading your privacy and security. It’s time to take your security seriously. Download the full version of Norton Security Deluxe free for 30 days, and test-drive it on up to 5 of your devices – PCs, Macs, smartphones or tablets.
Create an account today and be up and running in minutes.
Disclaimers and references:
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
Copyright ? 2020 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.