Vulnerabilities / Threats // Advanced Threats
04:50 PM
Connect Directly

Here Comes Locky, A Brand New Ransomware Threat

Infected Word files being used to spread ransomware, security researchers say.

If it sometimes feels like it's raining ransomware threats these days, that’s only because it is.

Cyber crooks, obviously buoyed by the growing success of their peers with using such malware, have been releasing more versions with alarming regularity. The newest one to join the increasingly crowded ranks of ransomware tools is "Locky," a somewhat awkwardly named but just as dangerous tool as the ones already floating out there.

UK-based security researcher Kevin Beaumont, who was one of the first to report on the new strain, on Wednesday reported seeing around 4,000 new infections per hour, or roughly 100,000 per day. When initially spotted about four days ago, Locky was detectable by just three antivirus products from what Beaumont described as niche vendors. Since then security vendors have updated their signatures and most major AV products now detect the malware Beaumont said in a post last updated Wednesday.

As with other ransomware tools,the operators of Locky are using it to encrypt content on infected systems and then to extract a ransom from victims in return for decrypting the content--in this case about half a Bitcoin, or roughly $210 at today’s rates.

Security researcher Lawrence Abrams, who has also been tracking Locky, described it as targeting a large number of file extensions on infected systems. “Even more importantly [it] encrypts data on unmapped network shares,” he said in a blog post on

“Encrypting data on unmapped network shares is trivial to code,” he said. The fact that another recent ransomware tool, dubbed DMA Locker, had the exact capability suggests this will become the norm going forward, he said. Locky is also similar to CryptoWall in that it changes the filenames for files it encrypts, making it harder to restore the right data, he added.

Locky is being distributed via a Microsoft Word attachment with malicious macros in it. Victims typically receive an email with an attached Word document purporting to be an invoice seeking payment for some product or service. Recipients who click on the attachment are presented with a document containing scrambled content and an instruction to click on an Office macro to unscramble it. Once enabled, the macro downloads Locky, stores it in the Temp folder and executes it.

Stu Sjouwerman, CEO of security vendor KnowBe4 said one way for enterprises to mitigate the risk is to disable all except digitally signed Office macros from running. If implemented correctly, users will not even see the prompt asking them to enable a macro when they click on the Word document attachment that is being used to distribute Locky, he said in a blog post outlining the steps security admins can take to disable macros.

Threat actors have been using ransomware tools like Locky to devastating effect recently. Just this week for instance, Hollywood Presbyterian Medical Center in Los Angeles said it was the victim of a ransomware attack that ended with it having to pay a ransom of $17,000 to get attackers to unlock the hospital data they had encrypted.

The success of these attacks suggest that the ransomware problem is not going anywhere soon says, Dodi Glenn, vice president of cybersecurity at PC Pitstop in comments to Dark Reading. “The actors behind [such attacks] are financially stable enough to continue to build newer versions of the malware. It is crucial to have important data backed up and stored offline in the event you are hit with ransomware,” he says.

Traditional blacklist antivirus engines have been having a hard time catching ransomware because malware authors are constantly changing portions of the code to remain undetected, he said. “Services like allow the hacker to upload newly created malware to see what any of the 54 different antivirus vendors say about the file. They will continue to tweak the file until no vendor detects it,” he said.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
2/19/2016 | 8:56:08 AM
17,000 paid
Very surprising that the hospital decided to pay the ransom. I suppose they did not have sufficient backups in place. Moving forward they will hopefully be better equipped after this snafu.
User Rank: Ninja
2/19/2016 | 8:53:50 AM
Interesting that Locky is using macros to encrypt data. Feels nostalgic of the 1990 macros that were prevalent. In this case easily mitigated with the disabling the execution of macros within office.
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.