Previous All Posts Next

JavaScript Ransomware: How It Infects Your Computer

Posted: April 20, 2016 to Cybersecurity.

Tags: Ransomware, Malware, Data Breach

There’s been a recent rash malware that utilizes JavaScript-based downloaders to install ransomware on victims’ computers. Like most ransomware, it then encrypts their files and demands payment in Bitcoins to get a key to unlock them. It’s pretty unusual for anyone to send a Javascript attachment, so users should be on the lookout for any suspicious emails that include files with the .js or .jse extension. It appears the hackers are using the Locky, Nemucod, and Swabfex versions of malware to carry out the attacks after tricking victims into downloading them via successful social engineering attempts. The cybercriminals typically make their emails sound as if they carry information the target needs, such as financial information. They then package the JavaScript inside a .zip or .rar file that the victim has to open, so users should watch for those file types as well. In this new crop of attacks, the attackers are basically using two strains of ransomware: Locky and Tescrypt, with Locky being best known for the recent shut downs of hospitals around the US due to ransom attacks. Anti-virus protection typically filters out ransomware and keeps it from ever being installed, but by utilizing JavaScript the hackers have been able to circumvent that. The best way to prepare for a ransomware attack is to develop robust backup and data recovery policies, especially in the health and finance industries. Secondly, businesses and organizations need to train their employees to be able to recognize social engineering attacks and phishing emails. It’s also a good idea for everyone to be running the latest version of their operating system and that their anti-malware software is up to date. Finally, every organization should have their email gateways scan and block any malicious code it comes across. In order to better protect yourself from being taken advantage of by ransomware, download the free Ransom Protection Checklist or sign up to receive it by mail. If you find that you might be at risk, schedule a free 10 minute Ransomware Safety Review.

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now