Categories: Ransomware

Locky Ransomware spreading through Facebook Messenger Via SVG File

SVG(Scalable Vector Graphics) send by your friend may have Locky Ransomwares, avoid clicking it. By appending the Ransomware to an image file can Bypass Facebook security framework pretending to be an image file.

SVG (Scalable Vector Graphics):

SVG is an XML-based vector image format for two-dimensional graphicswith support for interactivity and animation. The SVGspecification is an open standard developed by the World Wide Web Consortium (W3C) since 1999. SVGimages and their behaviors are defined in XML text files.

Ransomware:

A type of malicious software designed to block access to a computer system until a sum of money is paid.

Why make’s it as a Dropper?

SVG images can be created and edited with any text editor, more often they are created directly with a software that elaborates the images.More specifically, this means that you can embed any content you want (such as JavaScript), additionally, any modern browser will therefore able to open this file.

How do we Remove Malicious Extensions

Firefox and Chrome has already blocked this extension and we hope Facebook will do that soon. Suppose if you are tricked into installing in this malware file you should remove them immediately.

To remove the offending extension, just go to Menu → More Tools → Extensions and check for the extension and remove it.Even worse, if you were infected with the ransomeware the only way is to restore the files. Stay safe.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…

6 hours ago

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…

9 hours ago

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…

9 hours ago

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…

9 hours ago

Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access

CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…

11 hours ago

4M+ WordPress Websites to Attacks, Following Plugin Vulnerability

A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…

13 hours ago