JS Ransomware Operators Demand Bitcoin
Reversing JS Ransomware's encryption is not an easy task. It cannot be completed with the use of free tools and resources. To decrypt the files, victims need to acquire the unique decryption key that the JS Ransomware generated and sent to the attacker's server. The criminals offer to sell the key – the full details of their offer are available in the 'RESTORE_FILES_INFO.txt' ransom note.
According to the latter file, victims need to use the qTOX message service to get in touch with the criminals. While the ransom note does not specify any ransom fee, we can assure you that the crooks will ask for a Bitcoin or Monero payment. It is best not to trust them and attempt to buy a decryption tool – they might scam you with ease.
Victims of the JS Ransomware should use an up-to-date security tool to ensure the malware's full removal. This will prevent it from causing more damage, and enable them to explore popular data recovery options and tools.