
The global ransomware epidemic isn’t going to die anytime soon. After WannaCry and Petya, cyber criminals are now spreading an email-based Locky ransomware. The Indian Computer Emergency Response Team (CERT-In) has issued an alert on its website about the new Locky ransomware which spreads through spam emails. Cyber criminals demand payments in cryptocurrency bitcoin like WannaCry did. At the moment, there is no report of how much damage the Locky ransomware has caused in India. So, what is Locky ransomware, how does it spread, and how can we protect our computer from ransomware?
What is Locky ransomware?
How does it work?
The ransomware is being distributed through a new file extension called “.diablo6”, according to Malwarebytes research. A new variant adds the extension “.Lukitus” to encrypted files. Lukitus is the French word for locking. The ransomware campaign spreads through the help of spam emails containing a malicious ZIP attachment. These zip file attachments contain Visual Basic Scripts (VBS) embedded in a secondary zip file. The VBS file contains a downloader leading to domain “greatesthits [dot] mygoldmusic[dot] com”.
The e-mail messages contain common subjects like “please print”, “documents”, “photo”, “images”, “scans” and “pictures”. If you open these attachments, variants of Locky ransomware will automatically get download on the computer. You will soon find that the desktop background will be changed with one showing an HTM file named “Lukitus[dot]htm”. Users are instructed to pay a ransom of 0.5 Bitcoin , which is equivalent to Rs 1.5 lakh. Victims are instructed to install the Onion Router Network (TOR) browser, which takes users to a decryption service if they pay the ransom.
Can we stop the ‘deadly’ Locky ransomware?
There is currently no way to decrypt all those systems without paying a ransom. Researchers have not found a tool that can be used to unlock the infected computers.
How can we protect our computer from ransomware?
Here are some ways to protect your PC from ransomware:
• Back up your files.
• Use an antivirus program.
• Be suspicious of unknown emails and websites.
• Perform regular backups of all critical data stored on your computer.
• Never pay ransom.