Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Jigsaw Ransomware 4.6 – Remove and Restore Your Data

This article will help you remove Jigsaw ransomware 4.6 fully. Follow the ransomware removal instructions provided at the end.

Jigsaw ransomware 4.6 is the latest variant of the virus and features a new lock screen. The character Jigsaw from the SAW movie series is still featured on that screen. This version of the ransomware is still believed to be in-development and as such it might not encrypt files, yet. Continue to read to see how you could try to potentially restore some of your data.

Threat Summary

Name Jigsaw Ransomware 4.6
Type Ransomware
Short Description The ransomware will lock your computer screen and demand payment for getting your files back.
Symptoms The ransomware is possible to encrypt your files as well as locking your screen. It shows a ransom note which features the Jigsaw character from the movies “Saw”.
Distribution Method Spam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Jigsaw Ransomware 4.6

Download

Malware Removal Tool

User Experience Join Our Forum to Discuss Jigsaw Ransomware 4.6.
Data Recovery Tool Data Recovery Pro by ParetoLogic Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Jigsaw ransomware 4.6 – Infection

Jigsaw ransomware 4.6 ransomware could spread its infection via different methods. The payload file that initiates the malicious script for this ransomware, which in turn infects your computer machine, has been spotted by malware researchers and reported to the service of VirusTotal as seen below:

Jigsaw ransomware 4.6 ransomware could also spread its payload file on social media sites and file-sharing services. Freeware found on the Web can be presented as helpful but could also hide the malicious script for the virus. Don’t open files right after you have downloaded them, especially if they come from suspicious sources like links and e-mails. You should scan them beforehand with a security tool, while also checking their size and signatures for anything that seems unusual. You should read the ransomware prevention tips thread in our forum.

Jigsaw ransomware 4.6 – Analysis

Jigsaw ransomware 4.6 is the latest version of the ransomware virus that features the “SAW” movie series character Jigsaw that it gets its name from. The lock screen is changed, but still has the character in it. Malware researchers say that the virus is still under development and thus it is not being seen to enforce its encryption capabilities as of yet.

Jigsaw ransomware 4.6 ransomware could make entries in the Windows Registry to achieve a higher level of persistence, possibly launch and repress processes in the Windows Operating System. Some entries are designed in a way that will start the virus automatically with each launch of Windows.

The ransom note will appear as a lock screen after your computer system becomes infected with Jigsaw ransomware 4.6. The note has minor changes compared to the original Jigsaw ransomware virus. Inside you will find details about what the crooks behind the lock screen want you to do regarding payment. You can view the ransom message that loads the in the snapshot below:

That ransom note reads the following:

JIGSAW RANSOMWARE

Your computer files have been encrypted by Jigsaw Ransomeware version 4.6
Your photos, videos, documents, ect…. But don’t worry! I have not deleted them, yet.
You have 24 hours to pay 150 USD in Bitcoins to get the decryption key. Every hour
files will be deleted. Increasing in amount everytime.

If you do not have Bitcoins, Google the website Localbitcoins.com and purchase 150
USD worth of Bitcoins or .4 Bitcoins. The system will accept.
Send to the Bitcoins address specified. Within two minutes of receiving your payment
your computer will receive the decryption key.

Try anything funny and the computer has several safety measures to delete your files.
As soon as the payment is received the crypted files will be returned to normal.

Thank you, Jigsaw
You have 24 hours to pat $150 USD to
the Bitcoin address
24 Hours remain

If you do not comply with the payment your files will stay encrypted and may be stolen

The note of the Jigsaw ransomware 4.6 ransomware states that your you have 24 hours to pay the sum of 150 US dollars in Bitcoin or your files can get deleted or lost forever. If the virus follows suit of its previous variants, it would mean that the same scare tactic is used to lure people in to pay the ransom price. You should NOT under any circumstances pay these cybercriminals. Nobody can give you a guarantee that you will get your files back. Moreover, giving money to these criminals will likely motivate them to create more ransomware viruses and do other criminal activities.

Jigsaw Ransomware 4.6 – Encryption Process

The currently found samples of this malware suggest that the encryption that is used by this ransomware virus is that of VBS. VBS stands for “Visual Basic Script” and it is an active scripting language developed by Microsoft. The files which will be implemented for encryption for the 4.6 version of the Jigsaw ransomware could include the targeted extensions from its past variants, which are:

→ .3dm, .3g2, .3gp, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .raw, .rb, .rtf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx

For now, the Jigsaw ransomware 4.6 ransomware is still in development and not confirmed to encrypt files. To help itself with the efficiency of its encryption, the cryptovirus could be set to delete the Shadow Volume Copies from the Windows Operating System by using the following command:

→vssadmin.exe Delete Shadows /All /Quiet

That would make it impossible to restore your files that way. Keep on reading and see what types of ways you could try to potentially restore some of your data.

Remove Jigsaw ransomware 4.6 and Restore Your Data

If your computer got infected with the Jigsaw ransomware 4.6 ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Manually delete Jigsaw Ransomware 4.6 from your computer

Note! Substantial notification about the Jigsaw Ransomware 4.6 threat: Manual removal of Jigsaw Ransomware 4.6 requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Jigsaw Ransomware 4.6 files and objects
2.Find malicious files created by Jigsaw Ransomware 4.6 on your PC

Automatically remove Jigsaw Ransomware 4.6 by downloading an advanced anti-malware program

1. Remove Jigsaw Ransomware 4.6 with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by Jigsaw Ransomware 4.6
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.