Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

2/18/2016
04:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Here Comes Locky, A Brand New Ransomware Threat

Infected Word files being used to spread ransomware, security researchers say.

If it sometimes feels like it's raining ransomware threats these days, that’s only because it is.

Cyber crooks, obviously buoyed by the growing success of their peers with using such malware, have been releasing more versions with alarming regularity. The newest one to join the increasingly crowded ranks of ransomware tools is "Locky," a somewhat awkwardly named but just as dangerous tool as the ones already floating out there.

UK-based security researcher Kevin Beaumont, who was one of the first to report on the new strain, on Wednesday reported seeing around 4,000 new infections per hour, or roughly 100,000 per day. When initially spotted about four days ago, Locky was detectable by just three antivirus products from what Beaumont described as niche vendors. Since then security vendors have updated their signatures and most major AV products now detect the malware Beaumont said in a post last updated Wednesday.

As with other ransomware tools,the operators of Locky are using it to encrypt content on infected systems and then to extract a ransom from victims in return for decrypting the content--in this case about half a Bitcoin, or roughly $210 at today’s rates.

Security researcher Lawrence Abrams, who has also been tracking Locky, described it as targeting a large number of file extensions on infected systems. “Even more importantly [it] encrypts data on unmapped network shares,” he said in a blog post on BleepingComputer.com.

“Encrypting data on unmapped network shares is trivial to code,” he said. The fact that another recent ransomware tool, dubbed DMA Locker, had the exact capability suggests this will become the norm going forward, he said. Locky is also similar to CryptoWall in that it changes the filenames for files it encrypts, making it harder to restore the right data, he added.

Locky is being distributed via a Microsoft Word attachment with malicious macros in it. Victims typically receive an email with an attached Word document purporting to be an invoice seeking payment for some product or service. Recipients who click on the attachment are presented with a document containing scrambled content and an instruction to click on an Office macro to unscramble it. Once enabled, the macro downloads Locky, stores it in the Temp folder and executes it.

Stu Sjouwerman, CEO of security vendor KnowBe4 said one way for enterprises to mitigate the risk is to disable all except digitally signed Office macros from running. If implemented correctly, users will not even see the prompt asking them to enable a macro when they click on the Word document attachment that is being used to distribute Locky, he said in a blog post outlining the steps security admins can take to disable macros.

Threat actors have been using ransomware tools like Locky to devastating effect recently. Just this week for instance, Hollywood Presbyterian Medical Center in Los Angeles said it was the victim of a ransomware attack that ended with it having to pay a ransom of $17,000 to get attackers to unlock the hospital data they had encrypted.

The success of these attacks suggest that the ransomware problem is not going anywhere soon says, Dodi Glenn, vice president of cybersecurity at PC Pitstop in comments to Dark Reading. “The actors behind [such attacks] are financially stable enough to continue to build newer versions of the malware. It is crucial to have important data backed up and stored offline in the event you are hit with ransomware,” he says.

Traditional blacklist antivirus engines have been having a hard time catching ransomware because malware authors are constantly changing portions of the code to remain undetected, he said. “Services like VirusTotal.com allow the hacker to upload newly created malware to see what any of the 54 different antivirus vendors say about the file. They will continue to tweak the file until no vendor detects it,” he said.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/19/2016 | 8:53:50 AM
1990's
Interesting that Locky is using macros to encrypt data. Feels nostalgic of the 1990 macros that were prevalent. In this case easily mitigated with the disabling the execution of macros within office.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
2/19/2016 | 8:56:08 AM
17,000 paid
Very surprising that the hospital decided to pay the ransom. I suppose they did not have sufficient backups in place. Moving forward they will hopefully be better equipped after this snafu.
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12551
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the Memcpy function (provided by the scripting engine) allows an attacker to overwrite arbitrary memory, which could lead to code execution.
CVE-2019-12552
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, an integer overflow during the initialization of variables could allow an attacker to cause a denial of service.
CVE-2019-3414
PUBLISHED: 2019-07-22
All versions up to V1.19.20.02 of ZTE OTCP product are impacted by XSS vulnerability. Due to XSS, when an attacker invokes the security management to obtain the resources of the specified operation code owned by a user, the malicious script code could be transmitted in the parameter. If the front en...
CVE-2019-10102
PUBLISHED: 2019-07-22
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". Th...
CVE-2019-10102
PUBLISHED: 2019-07-22
aubio 0.4.8 and earlier is affected by: null pointer. The impact is: crash. The component is: filterbank. The attack vector is: pass invalid arguments to new_aubio_filterbank. The fixed version is: after commit eda95c9c22b4f0b466ae94c4708765eaae6e709e.