Security News Locky Ransomware Spam Campaigns Switch to Macro-Based Distribution

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
The criminal group behind the Locky ransomware switched distribution tactics at the start of June, abandoning JS-based droppers for malicious Microsoft Office documents with the DOCM file extension.

Since it appeared, if there was one common feature in all the Locky spam, it was the fact that Locky used a boobytrapped JavaScript file packed inside a ZIP file, which the crooks sent to potential victims via spam emails.

According to FireEye, starting with August 2016, the group uses macro scripts embedded in Office DOCM files. When the user opens these documents and allows the macro script to execute by "enabling editing," the script connects to an online server, downloads and installs the ransomware.

Multiple Locky spam campaigns hit various countries around the world
FireEye says that this new wave of Locky spam has impacted victims from all over the world, not just a specific area. Of course, some countries are more targeted than others, but everyone is spammed in the end.

According to statistical data gathered in the first half of the month of August, users in the US, Japan, Republic of Korea, Thailand, and Singapore received the most spam.

Based on the email addresses at the receiving end of all this spam, researchers say that the healthcare sector was the most targeted, no doubt because of the recent high-profile cases where the infected institutions eventually ended up paying the ransoms.

Other targeted industries included the telecom field, transportation, manufacturing, and general services.

Read more: Locky Ransomware Spam Campaigns Switch to Macro-Based Distribution
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top