Security News Huge Spam Wave Drops Locky Variant That Can Work Without an Internet Connection

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
During the past days, the crooks behind the Locky ransomware have amped up their operations and distributed hundreds of thousands of spam emails that contain malicious files, which, when opened, would install a new version of the Locky ransomware that can work without an Internet connection.

Finnish security firm F-Secure observed the campaign and pointed out that, on July 12, the group behind this ransomware sent out a whopping 120,000 spam email messages every hour in two massive surges of activity.

As with past Locky campaigns, these files were ZIP archives that contained a JavaScript file, which, when executed, installed the Locky ransomware.

New Locky version appears on the same day as the spam surge
According to German security vendor Avira, its researchers stumbled upon a new Locky version that can work in "offline mode."

Avira's experts said they detected this new variant on July 12, the same day when the spam surge happened, but they reported independently of F-Secure, so it is not officially confirmed that the spam wave delivered the new variant, even if all clues point to it.

This new Locky version is very different from past Locky variants, which needed an Internet connection to start the encryption process. Because of this, network administrators discovered that, by shutting down Internet access to a company when they detected one Locky infection, they could also stop subsequent computers from being compromised.

New Locky version uses a much simpler encryption scheme
Locky's authors seem to have addressed this issue and have now created a variant that can work around this limitation, albeit using a weaker encryption method.

"That [speaking of Locky's offline mode] makes it tougher to block," said Avira's Lyle Frink. "But, this new variant may have the weakness that once someone has paid the ransom for their private key ID - it should be possible to reuse the same key for other victims with the same public key."

This comes in handy to corporate environments, where Locky's authors are known to ask for more money than usual, just because they managed to infect a computer holding more precious data.

Victims can pull the computer from the enterprise network, reinfect it, pay the ransom, and then use the decrypter to recover the files at a lower price.

This is possible because the Locky offline version generates the same ID per computer, unlike its online version that generates different IDs per infection, not per computer.
 

DardiM

Level 26
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
May 14, 2016
1,597
Thanks for sharing :)

I wonder if the fresh js downloader I recently received by e-mail downloads this last version :rolleyes:
(July, 12 2016 19:02 France time)
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Every threats are already smart at all, nothing become wasted because it will turn out as deadly.

Now people should be well educated that AV's is not enough anymore, strongly emphasize.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top