I cannot fault Dell for their alert being too late to protect the tens of thousands of systems that were infected by Jigsaw. If you stop and consider the process; Dell had to become aware of the threat. Dell had to get a copy of the ransomware and test in a secure environment. They had to document how Jigsaw spreads, where it installs, and then they had to create their antivirus signature. Even though Dell released their alert on April 22nd, 2016; I’m guessing they knew about it more than a few days before their press release.
How to Decrypt Jigsaw Ransomware
Jigsaw ransomware isn’t as complex as other ransomware products I’ve seen, and it can be decrypted quite easily. This is actually one of the first crypto ransomware products that can be decrypted without reverting to a backup or paying a ransom. The fact that this is easy to decrypt might be comforting to some, but I think something more sinister is going on. I think the cybercriminals are continuing to launch attacks in numbers never before seen, and I also think less sophisticated actors are finding how easy it is to make money with ransomware and are jumping into the game. There are a lot of sobering statistics that seem to back up that hypothesis.
Cybercriminals Getting Busy with Ransomware in 2016
2015 saw explosive growth for the ransomware industry and so far 2016 looks to be even better for cybercriminals. According to cybersecurity firm Proofpoint, email, social media, and mobile devices have been the most exposed vectors for cybercriminals in Q1.
Why Signature Based Solutions Fail
The Ransomware Solution!
WatchPoint is releasing CryptoStopper.io to identify, isolate and stop Ransomware, even after it has infected your network and gotten through all of your prevention systems.
Learn more and download a fully functional 14-day test drive. The trial allows you to simulate a Ransomware attack on your network and see the isolation process in action.
More Articles for Your Enjoyment!
Why Didn't My AntiVirus Detect CryptoWall?
Another Hospital Becomes Victim of Ransomware
Shodan Demonstrates Why Closing Unused IoT Ports is Critical to Cyber Security