Locky ransomware activity ticks up

Locky is now one of the most commonly seen types of ransomware

Locky, a new family of ransomware that emerged in the last few weeks, has quickly made a mark for itself.

Computer security companies say it has become a commonly seen type of ransomware, which is used to hold a computer’s files hostage pending a ransom payment.

Trustwave's SpiderLabs said on Wednesday that 18 percent of 4 million spam messages it collected in the last week were ransomware-related, including many linked to Locky.

"We are currently seeing extraordinary huge volumes of JavaScript attachments being spammed out, which, if clicked on by users, lead to the download of a ransomware," wrote Rodel Mendrez, a Trustwave security researcher.

Locky is distributed through spam messages that have been sent through the same botnet used to send Dridex, the infamous online banking malware.

At first, the spam messages contained malicious Microsoft Word documents with macros that would download Locky. But McAfee wrote on Monday that recent Locky spam contains an obfuscated JavaScript file, which if executed downloads the ransomware.

"We believe the change to JavaScript is to evade antimalware products due to its obfuscation and small size, which suggests the file is benign," McAfee wrote.

Security vendor Fortinet studied statistics collected by its Intrusion Prevention System software between Feb. 17 and March 2. The software detects when ransomware connects to command-and-control servers used by cybercriminals to manage the malware.

It found that about 16.4 percent of 18 million communications it detected were for Locky infections, with the rest belonging to CryptoWall and TeslaCrypt, the other top ransomware families.

"As predicted, Locky already covers a big chunk of the infections," wrote Roland Dela Paz, senior antivirus analyst with Fortinet.

Most of the Locky infections appear to be in the U.S., France and Japan, he wrote.

The FBI has warned that ransomware has become one of the biggest threats to consumers and businesses. Although some ransomware writers made mistakes in their code early on, there's usually no way to recover the files if the decryption key is not released.

The ransom is usually a few hundred dollars, with detailed instructions displayed to victims for how to pay in bitcoin. Security experts generally recommend backing up files to recover from a ransomware attack and ensuring the backup drive can't be reached by malware.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags ransomwaretrustwaveLocky

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Ada Chan

Dynabook Portégé X30L-G

I highly recommend the Dynabook Portégé® X30L-G notebook for everyday business use, it is a benchmark setting notebook of its generation in the lightweight category.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?