Jsworm

Description

JSWorm is a ransomware family that first appeared in May 2019 and is notable for undergoing multiple rebrands and evolutions, later appearing under names such as Nemty, Nefilim, Offwhite, Fusion, and Milihpen. Initially, it was distributed via malicious spam emails containing JavaScript files, hence the “JS” in its name. Later versions moved to targeted intrusions, leveraging compromised RDP services and vulnerable network appliances for initial access. JSWorm encrypts files using AES-256 encryption with RSA-2048 for key protection and appends campaign-specific extensions (e.g., .JSWORM, .Nemty, .Nephilim). The group adopted a double-extortion model in its later stages, stealing data before encryption and threatening to leak it via Tor-hosted sites. Its victimology spans various sectors worldwide, including manufacturing, energy, healthcare, and professional services. The continuous rebranding suggests an effort to evade detection, disrupt attribution, and maintain pressure on victims.

External Analysis
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/jsworm-nemty-rebrands-to-avoid-detection/
https://www.bleepingcomputer.com/news/security/jsworm-ransomware-rebrands-to-nemty-with-new-encryption-routines/
https://www.trendmicro.com/en_us/research/20/g/nefilim-ransomware-shifts-to-double-extortion.html
Urls
Screen
File servers
Screen
Chat servers
Screen
Admin servers
Screen