Locky virus: still on rampage


Since the middle of February, when the Locky virus has come into daylight, it still remains a hot topic among cyber security experts. Within its period of spreading, it has infiltrated into thousands of computers already. Along with individual users, companies have been hacked as well.

Those who haven’t encountered the virus yet (luckily!) might be unaware of the original story when Locky made its appearance. It walked into the spotlight after hacking into Hollywood Presbyterian Medical Centre computers and encrypting valuable information. However, the virus didn’t stop here. In exchange for the information, it demanded a subtle amount of money — $3,4 million.

Therefore, individual Internet users in Canada, USA, France, Japan have been attacked as well. In the beginning, it was suspected that it escaped users in East Europe, thus, some security specialists accused Russian hackers of creating this ransomware. However, later it has been revealed that the virus was translated into various languages, and it attacked Russian Internet users as well.

Within the current weeks when the Locky virus has been on a rampage, the anti-virus software developers are working hard to publish program updates to track the virus. In the beginning, the virus has slipped successfully into victim’s computer without any alarm signals by anti-virus applications. Luckily, now the IT professionals have managed to improve their software. At the moment, the majority of anti-virus software can detect the virus.

However, the cyber criminals do not slack off as well. In the beginning, it infiltrated users’ system mainly due to infected Word files. Now it has switched to JavaScipt attachments. The spam mails arrive with ‘.js’ add-ons into users’ Inboxes. Spam Research Database specialists have detected that around 4 million malware spams with such attachments fell into their spam trap. Nevertheless, it still unknown what is the actual scale of spread infected mails. Once such mail gets into your inbox, and Microsoft macros are enabled, the malware slithers into a system encrypting your files under “.locky” title. The virus is using AES and RSA encryption algorithms which are frequently used and said to be most secure. NSA (USA’s “National Security Agency”) also employs this algorithm to encrypt their top-secret documents. Thus, it makes Locky even more troublesome.

Since the virus hasn’t been suspended yet and the culprits are still at large, Internet users are encouraged to be extremely careful and advised not to open any emails from unknown senders. Finally, you may check our Locky virus removal guide as well.

Comments are closed.