August 16, 2016 By Douglas Bonderud 3 min read

Locky ransomware is a big player in the encrypted file market. As noted by IT Pro Portal, two-thirds of all malicious emails in Q2 2016 contained Locky, and other malware-makers have been imitating this popular attack vector to intimidate users and convince them to pay up.

Not willing to rest on their laurels, however, it seems the creators of Locky have headed south and added a few new tricks to their arsenal. According to Trend Micro, the ransomware was recently spotted in the Brazilian underground market using Windows Script Files (WSF) to improve their delivery method. Here’s a look at what’s next on the hit list for Locky.

Locky Ransomware Keeps Moving

Like a boxer avoiding the knockout blow, Locky’s creators keep moving, constantly changing tactics to make sure security researchers can’t get a fix on their position. It’s such an effective strategy that other forms of ransomware, such as PowerWare, are trying to pass themselves off as Locky to spook users into paying the ransom.

As noted by Threatpost, PowerWare is “relatively lame compared to Locky,” since it only uses AES-128 encryption to lock down the first 2,048 bytes of target files. What’s more, researchers have already developed a Python script that can extract the static decryption key from PowerWare code and save user files.

Cashing in on Fear

With Locky, however, it’s a different story. Many users choose to pay up rather than risk the wrath of this ransomware. To cash in on the fear, PowerWare has started encrypting its files with a .locky extension to make it seem like victims are in serious trouble.

According to the Trend Micro piece, the Locky ransomware isn’t above borrowing from its competitors where warranted: New discoveries of the code in Brazil show it using the same kind of WSF delivery techniques leveraged by this year’s Cerber email campaign.

As discussed by SC Magazine, this relatively new technique is paying big dividends because WSFs let attackers use more than one scripting language in a single file. Since these files aren’t on the list of typically malicious payloads, they’re not present on most watchlists.

Blacklisting is also problematic because these files have different hashes for different types of malware; one recent variant looked like a legitimate Yahoo Widget. When it comes to infection, it seems the Brazilian brand of Locky is targeting companies with file attachments in spam emails using subject lines such as “bank account record,” “annual report” or “company database.”

Batten Down the Hatches

It’s no surprise that cybersecurity experts have been on high alert for scams surrounding Brazil’s global sporting event. Brazil has always been a hotbed for this kind of digital crime, with experts reporting $8 billion per year in losses from cybercrime.

Why the big market? In large measure, it’s because cybersecurity hasn’t caught up to attack volume, leading to a market where most malware lacks sophistication but gets the job done. With cyber law enforcement still in its infancy, the Brazilian digital underground is the perfect place for Locky ransomware creators to take a breather, examine their code and develop new ways to infiltrate corporate computers.

The Brazilian cybercrime market is effectively a staging ground — a great place for smash-and-grab coders to ply their wares and more powerful tools like Locky to hone their craft. It’s the second half of this scenario that should worry companies. With Locky adding new tricks to its arsenal, testing them on the Brazilian market and then bringing them to bear stateside, it’s worth battening down the digital hatches and making sure network defenses are prepared for the new WSF war.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today