2 min read

Locky ransomware disguises itself as account suspensions and suspicious movements

Graham CLULEY

November 09, 2016

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Locky ransomware disguises itself as account suspensions and suspicious movements

One of the golden rules of computer security for the last twenty-or-so years has been to be extremely cautious of unsolicited emails.

It’s one of the favourite methods used by cybercriminals to trick unsuspecting computer users into opening dangerous attachments or clicking on a link to a malicious webpage.

The method has been proven to be successful time and time again, especially when combined with cunning social engineering tricks to dupe victims into clicking before they have applied some good old-fashioned common sense.

In the last few days there have been a spate of spammed-out attacks using similar techniques to dupe unwary internet users into clicking on an attachment that will lead to their Windows PC being infected with the notorious Locky ransomware.

For instance, you might have seen messages like the following appearing in your inbox, claiming that there have been “suspicious movements” of funds out of your bank account.

suspicious-movement-email

Attached to the email is a ZIP file containing a malicious .JS (Javascript) file, that if opened downloads a version of the Locky ransomware from a remote server from one of five different URLs, saved in a temporary folder under the name “GyFsMGsLUNA.dll”.

The malware is executed without any requirement for further user interaction. Bitdefender anti-virus products detect the malicious Javascript as Trojan.JS.Downloader.GXW.

Similar attacks have been spammed out claiming that your credit card has temporarily been suspended.

account-suspended

Alternatively, you might have received emails posing as notifications that you have a parcel waiting for you at your local mail office.

parcel-email

In this final example, which also leads to the Locky ransomware, the malicious code sets the year to 2015. However, regardless of the year, the malware still executes. Bitdefender detects the Javascript file as Trojan.Js.Downloader.Na and the executable it downloads as Trojan.Ransom.Locky.BF.

In all cases, the criminals can (and frequently do) change the names and contact details used in the emails meaning that you cannot always rely on them looking the same.

The secret is to run a layered defence, combining up-to-date security software on your desktops and email gateways with regular backups and user awareness training to teach employees to be wary of dangerous filetypes and trusting unsolicited emails.

We know that criminals are making a vast amount of money out of online extortion – and ransomware is one of their favourite methods. When combined with spam and tricky social engineering disguises, it’s hard to imagine that it won’t continue to be a profitable source of income for cybercriminals for some time to come.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read