 A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far.
A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far.
Quick facts
According to a threat intelligence report, the email-based ransomware attacks started on August 9 and were detected through 62,000 phishing emails in 133 countries in just three days. It also revealed that 11,625 IP addresses were used to carry out the attacks, with the IP range owners consisting mostly of internet service providers and telecom companies.
How it works
The malicious email contains an attachment named “E 2017-08-09 (580).vbs” and just one line of text. Like the original Locky authors, attackers responsible for the new variant deploy social engineering tactics to scam recipients into opening the attached .doc, zip, pdf, .jpg or tiff file, which installs the ransomware into their systems.
When an unsuspecting user downloads the file, the macros run a file that provides the encryption Trojan with an entry point into the system. The Trojan then encrypts the infected computer’s files.
Once encryption is completed, the user receives instructions to download the Tor browser so they can access the “dark web” for details on how to pay the ransom. To retrieve their encrypted files, users will be asked to pay from 0.5-1 Bitcoin.
What you need to do
This ransomware variant builds on the strengths of previous Trojans. In fact, the original Locky strain made it easy for cyber criminals to develop a formidable ransomware that could evade existing cyber security solutions. This is why adopting a “deny all” security stance, whereby all files are considered unsafe until proven otherwise, is the best way to avoid infection.
Here are other tips to avoid infection:
- Don’t open unsolicited attachments in suspicious emails. Alert your IT staff, and most importantly disallow macros in Microsoft Office unless they’ve been verified by your IT team.
- Performing regular backups guarantees you never have to pay cyber criminals a ransom. If all other security measures fail, you can always rely on your backups, which protect your business not just from cyber crime-related disasters, but also from natural and other unforeseen system failures.
- Train your staff to identify online scams like phishing. This and other similar ransomware strains take advantage of users’ lack of cyber security training.
- Update your operating systems as soon as updates become available to reduce, or eliminate, the chances of your system’s vulnerabilities being exploited.
Even with a trained staff and the latest protections installed, your IT infrastructure may still have unidentified security holes. Cyber security experts can better evaluate your entire infrastructure and recommend the necessary patches for your business’s specific threats. To secure your systems, get in touch with our experts now.

 Success is not just about putting in the hours, but also being adaptive and investing in the right tools to improve outputs. Keeping work confined to the office might have been adequate years ago, but not anymore. Today’s workforce is now more mobile than ever, which is why businesses are turning to remote access solutions. Amazon AppStream 2.0 is one such solution that has quickly gained traction, find out why.
Success is not just about putting in the hours, but also being adaptive and investing in the right tools to improve outputs. Keeping work confined to the office might have been adequate years ago, but not anymore. Today’s workforce is now more mobile than ever, which is why businesses are turning to remote access solutions. Amazon AppStream 2.0 is one such solution that has quickly gained traction, find out why. Do you still have old PCs and laptops lying around somewhere? If you’re thinking about finally trashing them, don’t! Despite being big, slow, and prone to crashes, you can still make good use out of your old computer.
Do you still have old PCs and laptops lying around somewhere? If you’re thinking about finally trashing them, don’t! Despite being big, slow, and prone to crashes, you can still make good use out of your old computer. What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important.
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. Building a rapport with customers has never been easier with customer relationship management (CRM) software. You can track contact information, buying preferences, and sales patterns. It’s a must-have for all sales and marketing teams. But if this is the first time you’re using CRM software, try adopting the following best practices.
Building a rapport with customers has never been easier with customer relationship management (CRM) software. You can track contact information, buying preferences, and sales patterns. It’s a must-have for all sales and marketing teams. But if this is the first time you’re using CRM software, try adopting the following best practices. Increased productivity and constant collaboration are two of the main reasons why businesses have integrated a mobile policy into their business. This means an increased use of mobile devices such as smartphones and tablets in daily operations. But as the number of mobile users continues to grow, so does the number of cyber crime. Reduce your IT staff’s headaches by following these steps in protecting your mobile devices.
Increased productivity and constant collaboration are two of the main reasons why businesses have integrated a mobile policy into their business. This means an increased use of mobile devices such as smartphones and tablets in daily operations. But as the number of mobile users continues to grow, so does the number of cyber crime. Reduce your IT staff’s headaches by following these steps in protecting your mobile devices. When social media is used correctly, marketers can better understand their target audience and thus create better content and deliver it more effectively. This is vital since you’ll be able to send customers tailor-made content that helps increase conversion rates and sales revenue. Grow your business with social media with these four steps:
When social media is used correctly, marketers can better understand their target audience and thus create better content and deliver it more effectively. This is vital since you’ll be able to send customers tailor-made content that helps increase conversion rates and sales revenue. Grow your business with social media with these four steps: