Jigsaw ransomware wants to play a game, but not in a good way
Written by a NortonLifeLock employee
An unusual strain of ransomware has shown up on the scene, and it isn’t playing nicely at all. Dubbed “Jigsaw,” the ransomware was created in early March and made its way to the black market a week later, selling for around $140 USD. So far, it seems that there has been minimal sales of the malware. Luckily, it is not widespread yet.
Don’t wait until a threat strikes.
Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device – like most of us do – you need an all-in-one security suite. Meet Norton Security Premium.
Enjoy peace of mind on every device you use with Norton Security Premium.
No Credit Card Required
Ransomware With a Wicked Twist
This is not your average ransomware. Yes, Jigsaw ransomware will encrypt your files and demand a ransom in order to retrieve your files, however Jigsaw comes with a countown timer. Once the malware is deployed, the Jigsaw clock starts ticking. During the first 24 hours it will start deleting a few files every hour. On the second day, the ransomware will delete hundreds of files, on the third day it will delete thousands- until the ransom is paid. Additionally, if you try to tamper with the ransomware or even restart your computer, it will delete 1000 files a “punishment.”
Newer versions of the Jigsaw ransomware don’t use the image of the iconic character anymore, however it is still referred to as Jigsaw.
While ransomware is one of the more problematic threats on the Internet landscape today, there are many ways you can protect yourself from it. By being proactive in your own cyber defense, you can thwart cybercriminals in three easy steps:
- Perform regular backups of your computer. Be sure to unplug the back up drive when not in use.
- Use an Internet security software program to prevent the ransomware from being installed on the computer in the first place. Norton Security protects customers from this particular threat and many other ransomware threats.
- Ransomware and other malware can sneak in through vulnerabilities in software programs. Be sure to perform all software updates when they become available in order to close up the “holes” in your system.
Finally, do not EVER pay the ransom. There’s no guarantee that you will get your files back, and more than anything you are funding the cybercriminals operations further.
Today’s attacks are multi-pronged. That’s why you need a layered approach to security.
Norton software blocks web-based attacks at the network level, before they ever reach your PC.
Now you can help protect against malware with Norton AntiVirus Basic.
Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.
Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.