Ransomware Warning - "Locky"


Ransomware persists as one of the top crimeware threats thus far into 2016. While the use of document-based macros for ransomware distribution remains relatively uncommon, a new family calling itself “Locky” has borrowed the technique from the eminently successful Dridex to maximize its target base.

Locky focuses primarily on e-mail delivery through massive phishing campaigns with Microsoft Word document attachments. The subjects for these malicious messages adhere to the following convention:

ATTN: Invoice_J-< 8-digits>

The naming convention of respective malicious Word document carrier files match the e-mail subject line portion after the “ATTN: “, switch the “i” in invoice to lowercase, and append a “.doc” extension. An example follows:

Subject: ATTN: Invoice J-11256978 Attachment: invoice_J-11256978.doc

This leads to the following:

More Details at: http://researchcenter.paloaltonetworks.com/2016/02/locky-new-ransomware-mimics-dridex-style-distribution/

Stay Safe,

AJ Computers, LLC

#News #TechNews #RansomwareAlert

Featured Posts
Recent Posts
Archive
Search By Tags
No tags yet.

AJ Computers, LLC / aj Web Design Plus

P.O. Box 9662

Trenton, NJ 08650 

Website Proudly Created By: aj Web Design Plus

 

© AJ Computers / AJC LLC 

609-301-0252

  • Twitter Basic Black
  • Facebook Basic Black
  • Black Google+ Icon
  • Black YouTube Icon
  • Black LinkedIn Icon