• New Locky Ransomware Variant

    Author
    Topic
    #133579

    New Locky variant ransomware attack hits 20M attacks in one day
    In just 24 hours, an aggressive ransomware campaign has targeted many through fake Herbalife or file delivery emails.

    By Conner Forrest | September 20, 2017

     
    A new ransomware threat, discovered by researchers at the Barracuda Advanced Technology Group, has launched some 20 million attacks in a single day, according to a Tuesday blog post from Barracuda Labs. And the 20 million is just the start, at the post said the number of attacks was “growing rapidly.”

    The 3 big takeaways for TechRepublic readers:
    1. A new ransomware attack has hit more than 20 million email attempts within a single day, according to the Barracuda Advanced Technology Group.
    2. The ransomware came from emails claiming to be from a company called Herbalife and emails claiming that a copier needed to be delivered.
    3. Researchers determined that the attackers are using a single identifier, meaning that victims who pay the ransom won’t have their files decrypted.

     
    Read the full article here

    1 user thanked author for this post.
    Viewing 0 reply threads
    Author
    Replies
    • #133580

      Double trouble: This ransomware campaign could infect your PC with two types of file-locking malware
      Victims around the world hit by criminals who can switch the malicious payload of emails between Locky and FakeGlobal on a whim.

      By Danny Palmer | September 19, 2017

       
      Being infected by one form of ransomware is bad enough, but those unfortunate to fall victim to a new cybercriminal campaign could find themselves having to pay to decrypt their files not once, but twice.

      While a widespread email spam campaign with the intention of distributing ransomware isn’t anything new, those behind a scheme detected during September have added a twist to this tried and testing technique: rotating the ransomware payload.

      The two forms of ransomware distributed by this scheme are Locky – which has recently seen something of resurgence – and FakeGlobe, which first appeared in June. Those behind the campaign have designed it so the payload can be swapped, meaning the spam email might deliver Locky one hour then FakeGlobe the next.

      Uncovered by cyber security researchers at Trend Micro, the nature of the campaign means it’s possible for victims infected by one form of ransomware to still be vulnerable to a further attack from the next one in the rotation.

       
      Read the full article here

      1 user thanked author for this post.
    Viewing 0 reply threads
    Reply To: New Locky Ransomware Variant

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: