Vulnerabilities / Threats //

Advanced Threats

2/18/2016
04:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Here Comes Locky, A Brand New Ransomware Threat

Infected Word files being used to spread ransomware, security researchers say.

If it sometimes feels like it's raining ransomware threats these days, that’s only because it is.

Cyber crooks, obviously buoyed by the growing success of their peers with using such malware, have been releasing more versions with alarming regularity. The newest one to join the increasingly crowded ranks of ransomware tools is "Locky," a somewhat awkwardly named but just as dangerous tool as the ones already floating out there.

UK-based security researcher Kevin Beaumont, who was one of the first to report on the new strain, on Wednesday reported seeing around 4,000 new infections per hour, or roughly 100,000 per day. When initially spotted about four days ago, Locky was detectable by just three antivirus products from what Beaumont described as niche vendors. Since then security vendors have updated their signatures and most major AV products now detect the malware Beaumont said in a post last updated Wednesday.

As with other ransomware tools,the operators of Locky are using it to encrypt content on infected systems and then to extract a ransom from victims in return for decrypting the content--in this case about half a Bitcoin, or roughly $210 at today’s rates.

Security researcher Lawrence Abrams, who has also been tracking Locky, described it as targeting a large number of file extensions on infected systems. “Even more importantly [it] encrypts data on unmapped network shares,” he said in a blog post on BleepingComputer.com.

“Encrypting data on unmapped network shares is trivial to code,” he said. The fact that another recent ransomware tool, dubbed DMA Locker, had the exact capability suggests this will become the norm going forward, he said. Locky is also similar to CryptoWall in that it changes the filenames for files it encrypts, making it harder to restore the right data, he added.

Locky is being distributed via a Microsoft Word attachment with malicious macros in it. Victims typically receive an email with an attached Word document purporting to be an invoice seeking payment for some product or service. Recipients who click on the attachment are presented with a document containing scrambled content and an instruction to click on an Office macro to unscramble it. Once enabled, the macro downloads Locky, stores it in the Temp folder and executes it.

Stu Sjouwerman, CEO of security vendor KnowBe4 said one way for enterprises to mitigate the risk is to disable all except digitally signed Office macros from running. If implemented correctly, users will not even see the prompt asking them to enable a macro when they click on the Word document attachment that is being used to distribute Locky, he said in a blog post outlining the steps security admins can take to disable macros.

Threat actors have been using ransomware tools like Locky to devastating effect recently. Just this week for instance, Hollywood Presbyterian Medical Center in Los Angeles said it was the victim of a ransomware attack that ended with it having to pay a ransom of $17,000 to get attackers to unlock the hospital data they had encrypted.

The success of these attacks suggest that the ransomware problem is not going anywhere soon says, Dodi Glenn, vice president of cybersecurity at PC Pitstop in comments to Dark Reading. “The actors behind [such attacks] are financially stable enough to continue to build newer versions of the malware. It is crucial to have important data backed up and stored offline in the event you are hit with ransomware,” he says.

Traditional blacklist antivirus engines have been having a hard time catching ransomware because malware authors are constantly changing portions of the code to remain undetected, he said. “Services like VirusTotal.com allow the hacker to upload newly created malware to see what any of the 54 different antivirus vendors say about the file. They will continue to tweak the file until no vendor detects it,” he said.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/19/2016 | 8:56:08 AM
17,000 paid
Very surprising that the hospital decided to pay the ransom. I suppose they did not have sufficient backups in place. Moving forward they will hopefully be better equipped after this snafu.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/19/2016 | 8:53:50 AM
1990's
Interesting that Locky is using macros to encrypt data. Feels nostalgic of the 1990 macros that were prevalent. In this case easily mitigated with the disabling the execution of macros within office.
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-0363
PUBLISHED: 2018-06-21
A vulnerability in the web-based management interface of Cisco Unified Communications Manager IM & Presence Service (formerly CUPS) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulne...
CVE-2018-0364
PUBLISHED: 2018-06-21
A vulnerability in the web-based management interface of Cisco Unified Communications Domain Manager could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSR...
CVE-2018-0365
PUBLISHED: 2018-06-21
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protecti...
CVE-2018-0371
PUBLISHED: 2018-06-21
A vulnerability in the Web Admin Interface of Cisco Meeting Server could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of incoming HTTP requests. An attacker could exploit this vulnerability by sending a craf...
CVE-2018-0373
PUBLISHED: 2018-06-21
A vulnerability in vpnva-6.sys for 32-bit Windows and vpnva64-6.sys for 64-bit Windows of Cisco AnyConnect Secure Mobility Client for Windows Desktop could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to improper ...