By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Web Malware: Out of the Shadows and Hiding in Plain Sight
    8 months ago
    7 Reasons Kaspersky Internet Security 2015 is better than ever
    8 months ago
    Multi-stage phishing that starts with real links
    7 months ago
    Latest News
    Safeguards against firmware signed with stolen MSI keys
    18 hours ago
    WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
    18 hours ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (May 15, 2023 to May 21, 2023)
    6 days ago
    Wordfence Firewall Blocks Bizarre Large-Scale XSS Campaign
    7 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Critical vulnerability fixed in popular WordPress plugin Jetpack
    Critical vulnerability fixed in popular WordPress plugin Jetpack
    8 months ago
    Windows 10 22H2 new features and changes
    8 months ago
    Windows 11 build 22000.652 (KB5012643) out as preview
    8 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    3 months ago
    Now you can speed up any video in your browser
    3 months ago
    How to restore access to a file after EFS or view it on another computer?
    4 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    4 months ago
  • How To
    How ToShow More
    What is two-factor authentication | Kaspersky official blog
    2 days ago
    Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
    4 days ago
    NVIDIA GeForce RTX 4080 New Mercury Editions of Razer Blade 16 and Blade 18 now available
    4 days ago
    How Oxy uses hooks for maximum extensibility
    How Oxy uses hooks for maximum extensibility
    5 days ago
    The personal threat landscape: securing yourself smartly
    5 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    Simple Internet Safety Rules
    7 months ago
    How to find out the hidden age in Vkontakte?
    7 months ago
    How to remove the background from a photo?
    7 months ago
    Latest News
    How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
    2 days ago
    How to enable Taskbar End Task option to close apps on Windows 11
    2 days ago
    How to check USB4 devices specs from Settings on Windows 11
    2 days ago
    How to enable new header UI for File Explorer on Windows 11
    7 days ago
  • Glossary
  • My Bookmarks
Reading: Locky ransomware: one email can take all data away
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

Locky ransomware: one email can take all data away

Vitus White
Last updated: 13 October
Vitus White 4 years ago
Share
5 Min Read

Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals and brought $17,000 to its creators.

Tricky Locky ransomware robs American hospitals

The “baby,” was named Locky, and quickly gained global notoriety soon after it’s birth. The reason? It infected the medical records of Hollywood Presbyterian Medical Center in Los Angeles. Yes, the hospital who was crippled by and eventually paid $17,000 to get their records back.

#Locky #Ransomware Borrows Tricks from Dridex via @threatpost https://t.co/4VRyAas6pY pic.twitter.com/JO43afN7hq

— Kaspersky (@kaspersky) February 18, 2016

The new victim, Methodist Hospital in Henderson, Kentucky is a 217 bed acute care facility. To stop the infection, the hospital had to turn off all PCs in the network. Hospital administration are cooperating with the FBI and checking every device for infection, one by one. It’s possible that some data can be recovered from backups. Unlike the previous hospital attack, the ransom that was asked for was only $1,600. However, Methodist Hospital officials claim that money will be paid only if it comes to the worst.

Methodist Hospital officials – “The ransom was not paid. Our system is up and running.” @14News

— Jessica Gavin (@JessicaGavinTV) March 21, 2016

Locky’s adventures in Kentucky began with a letter, as is usually the case. Last Friday a hospital employee received spam and launched the file attachment that in turn downloaded ransomware from the criminals’ server, letting Locky into the network. The Trojan quickly copied all data on the device, encrypted it and deleted originals. Simultaneously Locky started its journey across the hospital’s corporate network, which could be stopped only by turning off all of the PCs.

Earlier Locky was delivered with the help of doc-files with malicious script, which downloaded the Trojan from remote servers. Later culprits modified tactics and switched to zip-archives with Java scripts, which also downloaded the Trojan from criminals servers and launched it. The majority of malicious letters were in English, but there were also emails, written in two languages simultaneously.

#Hospitals are under attack… what's at risk? https://t.co/b1WYjQgpfY via @61ack1ynx #Infosec pic.twitter.com/euuJ8041U0

— Kaspersky (@kaspersky) March 24, 2016

According to Kaspersky Security Network, Locky mostly attacks users in Germany, France, Kuwait, India, South Africa, USA, Italy, Spain and Mexico. As far as we know, Russia and CIS countries are of no concern to the Trojan.

It’s noteworthy that Locky is a very curious Trojan, as it gathers detailed statistics about each victim which is very unusual for ransomware. This keenness can be explained by culprits pecuniary interests: this activity helps them to determine the value of encrypted files in order to set individual ransom and gain huge profit.

10 tips to protect your files from ransomware https://t.co/o0IpUU9CHb #iteducation pic.twitter.com/I47sPIiWFF

— Kaspersky (@kaspersky) November 30, 2015

It’s unlikely that Locky was created to attack medical institutions specifically. Security experts are sure, that criminals will hunt for any users who heavily rely on data, such as lawyers, medical workers, architects and so on.

In conclusion we’d like to admit, that Kaspersky Lab solutions protect users from Locky on several levels of our multilayer defence:

  • The anti-spam module detects malicious emails sent by cybercriminals.
  • Built in email and file antiviruses spot the uploading scripts and warn the user. Our solutions detect these scripts as Trojan-Downloader.MSWord.Agent, Trojan-Downloader.JS.Agent and HEUR:Trojan-Downloader.Script.Generic.
  • The file antivirus recognizes the executable file and warns the user that Trojan-Ransom.Win32.Locky is detected.
  • The System agent module in Kaspersky Internet Security will find even unknown samples of Locky ransomware and notify the user that the PDM:Trojan.Win32.Generic is detected. Moreover, it will not allow the Trojan to encrypt files on your hard drive so no ransomware will be able to steal and lock your data and demand money.

Source: kaspersky.com

Translate this article

TAGGED: Malware, RC4, Security, Split tunneling, Threats
Vitus White October 13, 2022 September 30, 2019
Share this Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Safeguards against firmware signed with stolen MSI keys
Threats 21 hours ago
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
Wordpress Threats 21 hours ago
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
News 2 days ago
How to enable Taskbar End Task option to close apps on Windows 11
News 2 days ago
How to check USB4 devices specs from Settings on Windows 11
News 2 days ago

Recent Posts

  • Safeguards against firmware signed with stolen MSI keys
  • WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
  • How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
  • How to enable Taskbar End Task option to close apps on Windows 11
  • How to check USB4 devices specs from Settings on Windows 11

You Might Also Like

Threats

Safeguards against firmware signed with stolen MSI keys

21 hours ago
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
Wordpress Threats

WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin

21 hours ago
News

How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11

2 days ago
How To

What is two-factor authentication | Kaspersky official blog

2 days ago
Show More

Related stories

How to Use Cloudflare to Secure Your WordPress Site
How To Starting Chrome from the command line
How to fix error 0x80070057 in Chrome?
Windows 10 How To Disable Slide to Shutdown
Windows search not working (FIX)
How to watch movies and TV series for free on Kinopoisk?
Previous Next

10 New Stories

What is two-factor authentication | Kaspersky official blog
Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
NVIDIA GeForce RTX 4080 New Mercury Editions of Razer Blade 16 and Blade 18 now available
How Oxy uses hooks for maximum extensibility
The personal threat landscape: securing yourself smartly
Wordfence Intelligence Weekly WordPress Vulnerability Report (May 15, 2023 to May 21, 2023)
Previous Next
Hot News
Safeguards against firmware signed with stolen MSI keys
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
How to enable Taskbar End Task option to close apps on Windows 11
How to check USB4 devices specs from Settings on Windows 11
10alert.com10alert.com
Follow US

© 10 Alert Network. All Rights Reserved.

  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?