Friday, November 1, 2024
HomeRansomwareMassive Locky Ransomware Campaign Over 23 Million Messages sent in 24 hours

Massive Locky Ransomware Campaign Over 23 Million Messages sent in 24 hours

Published on

Malware protection

Locky Ransomware has a piece of a history of going silent and growing back all of a sudden.Security experts at Appriver detected this new campaign.

In span of 24 hours over 23 million messages sent out in the attack, which makes it one of the biggest malware campaign in latter half of 2017.

Locky Ransomware

Security experts detected this campaign on 28 August around 7 am CST.Email consist of any one of the following in subject lines.

- Advertisement - SIEM as a Service
  • please print
  • documents
  • photo
  • images
  • scans
  • pictures

Also Read Locky Ransomware spreading through Facebook Messenger Via SVG File

Each message accompanies a ZIP attachment that has a Visual Basic Script (VBS) document that is settled inside an arbitrary ZIP record. Once clicked, VBS record starts a downloader that connects with greatesthits[dot]mygoldmusic[dotcom] to pull down the most recent Locky Ransomware.
Locky Ransomware

Locky goes to work encoding every one of the records on the objective framework and adding [.]lukitus to the clients now encrypted files.Once all the victims documents have been encrypted by the attackers leave decoding guidelines by changing the desktop background to a picture with directions and additionally a HTML files on the desktop suitably named “Lukitus[dot]htm“.

Before this Comodo Threat Intelligence labs detected another variant of locky on August 19th as an attachment is an archive file, with the name “E 2017-08-09 (580).vbs.The attachement consist of a new member of the locky familiy IKARUSdilapidated.

Attackers uses social Engineering tricks to make the victims done as instructed which results in downloading the Trojan which encrypts the files.

Fatih Orhan, VP of Comodo Threat Intelligence Labs said “This latest ransomware phishing attack that commenced on August 9th was unique in its combination of sophistication and size, with botnet and over 11 thousand IP addresses from 133 countries involved in just the first stage of the attack.”

“Also he added When artificial intelligence couldn’t identify these unknown files, the full resources of the lab were needed to analyze and identify the code in the file and render a verdict”

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks

Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a...

Four Evil Ransomware Operators Sentenced For Hacking Enterprises

The St. Petersburg Garrison Military Court has sentenced four individuals involved in a notorious...

Dark Angels Ransomware Attacking Windows And Linux/ESXi Systems

The sophisticated ransomware group Dark Angels, active since 2022, targets large companies for substantial...