A legitimate feature in Microsoft Office that allows Word to load data from other documents is being exploited to push a new variant of the Locky ransomware. Victims are reportedly targeted with malspam messages via the infamous Necurs botnet.
Under the subject line “Emailed Invoice” followed by a string of random numbers, the malspam attack leverages Microsoft Dynamic Data Exchange (DDE). Distributed with the aid of the Necurs botnet, the exploit makes Microsoft Word display dialog messages that some users might dismiss reflexively, even though the dialogs contain security warnings.
Unbeknown to them, the succession of clicks ultimately downloads and runs the Locky ransomware, locking down the victims” hard drives and demanding 0.25 Bitcoin ($1,474 at today”s trading) in ransom money for the decryption keys.
Some reports claim that new version of Locky also exploits SMB flaws in non-patched computers on a network to spread to additional victims, in what would be described as wormable behavior similar to the WannaCry pathogen back in May. However, it isn’t yet clear if this is indeed the case.
The attack uses several elements to try and hide from antivirus software:
The illustration above depicts – in the simplest form – how the attack unfolds, courtesy of Brad Duncan (on duty at ICS at the time of discovery).
The updated Locky ransomware has been circulating for two months, but no major attacks have so far been recorded.
Users should follow basic safety rules and avoid downloading email attachments they are not expecting.
Bitdefender security solutions protect against this new ransomware threat.
tags
Filip has 15 years of experience in technology journalism. In recent years, he has turned his focus to cybersecurity in his role as Information Security Analyst at Bitdefender.
View all postsApril 03, 2025
March 12, 2025
February 20, 2025
February 11, 2025