Authored by George Boulos.

What You Need to Know

Recently, a new ransomware has been discovered. Called Locky, the malware encrypts data using AES encryption and then demands 0.5 to 1 bitcoin ($210–$420) to decrypt files.

To better understand why these kinds of attacks are on the rise, you should take a closer look at the financial return for cybercriminals. It was estimated that around 250,000 to 300,000 infections happened in the first three days of this campaign. With a 10 percent payout rate, ROI for an attacker can be conservatively estimated at $500,000. Even if you stress-test the ROI model, it seems to be a good investment for the criminal side.

How to Get Infected

Like recent ransomware attacks, Locky’s reach goes beyond the infected user desktop. It contains code to spread across network drives, allowing the potential impact to extend into an enterprise’s shared files outside of individual desktops.

Let’s take a closer look at how to defend against these attacks. A good starting place is the attack chain.

Locky is currently being distributed via a phishing email that contains Word document attachments with malicious macros. According to BleepingComputer, the email message will contain a subject similar to “ATTN: Invoice X-XXX” and a message with verbiage like, “Please see the attached invoice (Microsoft Word Document) and remit payment according to the terms listed at the bottom.”

Follow these steps and you might end up with a payment demand from a cybercriminal!

Is Locky an Exploit Attack?

The attacker is not exploiting a vulnerability in the system but rather exploiting human curiosity. Macros are disabled by default, so when the document is opened, the text will be scrambled and Word will provide a security warning message with the option to enable the macros. Once the victim enables the macros, it will download Locky from a remote server.

Locky comes with a hard-coded command-and-control (C&C) IP address that it uses for its encryption key exchange and reporting infection. It also uses a domain generation algorithm as part of its C&C infrastructure.

Source :
X-Force Exchange

Locky will then scan all local drives and unmapped network shares for data files to encrypt. To ensure success, Locky will also delete all the shadow volume copies on the computer so they cannot be used to restore files.

The last step here will be the ransom notes called _Locky_recover_instructions.txt. This ransom note contains information about what happened to the victim’s files and links to the decrypter page as well as a personal identification number for the victim.

The team behind Locky ensured that victims received all required details to make the payment, including how to purchase bitcoins and where to send payment. Once a victim sends payment, the attacker will provide information on how to decrypt the files.

What Can Be Done to Disrupt This Attack?

An educated user would think twice before allowing the macro to run. However, curiosity may have gotten the best of some to join the victims’ club, though in some cases, the shell script run by the macro to download the malware can be interpreted by security software as a malicious action, thus preventing the infection.

Furthermore, we can look at the communication aspect of the malware behavior in the attack chain to prevent said communication, block encryption key exchanges and prevent the malware from obtaining victim-specific keys to start the encryption process. While other options to eliminate or minimize the impact of such attacks may be viable, as well, we cannot stress enough the value of having a strong backup strategy to ensure damage is limited when all other options fail.

Locky and many other ransomware attacks have been on the rise. The immediate financial return is too good for cybercriminals to ignore. There is no reason not to expect an increase in numbers and sophistication — all emphasizing the value of including prevention strategies in your endpoint security.

More from

$10.3 Billion in Cyber Crime Losses Shatters Previous Totals

4 min read - The introduction of the most recent FBI Internet Crime Report says, “At the FBI, we know ‘cyber risk is business risk’ and ‘cybersecurity is national security.’” And the numbers in the report back up this statement. The FBI report details more than 800,000 cyber crime-related complaints filed in 2022. Meanwhile, total losses were over $10 billion, shattering 2021's total of $6.9 billion, according to the bureau’s Internet Crime Complaint Center (IC3).  Top Five Cyber Crime TypesIn the past five years, the…

4 min read

How to Boost Cybersecurity Through Better Communication

4 min read - Security would be easy without users. That statement is as absurd as it is true. It’s also true that business wouldn’t be possible without users. It’s time to look at the big picture when it comes to cybersecurity. In addition to dealing with every new risk, vulnerability and attack vector that comes along, cybersecurity pros need to understand their own fellow employees - how they think, how they learn and what they really want. The human element — the individual and social factors that…

4 min read

Detecting Insider Threats: Leverage User Behavior Analytics

3 min read - Employees often play an unwitting role in many security incidents, from accidental data breaches to intentional malicious attacks. Unfortunately, most organizations don’t have the right protocols and processes to identify potential risks posed by their workforce. Based on a survey conducted by SANS Institute, 35% of respondents said they lack visibility into insider threats, while 30% said the inability to audit user access is a security blind spot in their organizations. In addition, the 2023 X-Force Threat Intelligence Index reported that…

3 min read

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read