Booknish Jigsaw Virus — How to Remove It and Restore .booknish Files

The Booknish Jigsaw Virus is the newest strain of the Jigsaw ransomware family. It uses a complex infection algorithm that can cause devastating damage to the infected hosts. Advanced versions of it can induce a Trojan-like behavior that can spy on the users in real time, overtake control of the machines and load additional malware. Read our full removal guide in order to get rid of active infections.

Threat Summary

NameBooknish Jigsaw
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .booknish extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Booknish Jigsaw

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Booknish Jigsaw.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Booknish Jigsaw Virus – Distribution Ways

This new strain associated with the Jigsaw virus family uses the traditional delivery tactics. Once again one of the most popular means is the use of email messages that utilize social engineering tactics that attempt to manipulate the targets into interacting with the malware elements. The hackers behind the threat can either directly attach the strains to the messages or hyperlink them in body contents. In addition the messages can be used to spread viral payloads, two popular examples are the following:

  • Software Installers — The criminals can embed the dangerous Booknish Jigsaw virus into application installers of various types: (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: