July 7, 2016 By Douglas Bonderud 2 min read

Ransomware just won’t quit. It seems like every month there’s a new strain or variant making the rounds — and making life more difficult for users. The most recent king of the compromise hill was Locky, which not only encrypted files, but scrambled bitcoin wallets and removed Windows shadow copies before demanding payment.

According to Naked Security, however, a new challenger has emerged: Zepto, which shares many of Locky’s worst features. But is this “new Locky” just a stop on the ransomware road or a harbinger of more sinister software?

Familiar Feeling

According to Threatpost, Locky’s successor sent out almost 140,000 spam messages in the last week. While this is on the low end for most ransomware campaigns, it’s impressive given that it’s Zepto’s first appearance, according to Craig Williams of Cisco Talos.

The new malware infects devices using an attached .zip or .docm file. The .zip file contains a JavaScript file that looks like a text document at first glance but runs a ransomware downloader when opened. The .docm files, meanwhile, are “documents with macros.”

What’s interesting here is that macros are disabled by default in Word — when users open the document, they’re greeted with a blank document and a security warning that provides the option to enable macros. In effect, cybercrooks are hoping that natural curiosity will encourage users to do the dirty work of infecting their own machines.

Once installed, Zepto encrypts all files and then directs users to the Locky decryptor pay page, indicating that it’s at least borrowing from its predecessor — but the jury’s still out on whether the ransomware is a Locky variant or copycat. While its email infection numbers aren’t stellar, Williams warned Threatpost that a move to malvertising “could get bad very fast.”

New Tricks for Zepto

Popular Locky features and well-crafted spam emails make Zepto an immediate threat, but the ransomware is more worrisome as a touchstone for the new focus of encryption malware: fear. This is not simply the broad fear of a computer compromise and file loss, but the specific terror of knowing exactly what could disappear.

For Zepto, that means tagging every file with the same extension so users can see just how much they stand to lose. New variants are going even deeper: Tech2 detailed the use of TelsaCrypt to lock gaming files and force players to pay big money if they want to recover their saved games or online accounts.

There’s also JIGSAW, which takes its name from the villain of the “Saw” movie franchise. When users are infected, the malware explains that it “wants to play a game” and claims that in addition to locking down files, it will also send a copy of user data to all email contacts, in effect airing any digital dirty laundry.

Bottom line? Zepto is a lukewarm version of ransomware hot water. Attackers are putting users on notice and pulling out all the stops to incite fear and prompt payment.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today