Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,150,870 members, 7,810,314 topics. Date: Saturday, 27 April 2024 at 06:46 AM

Locky Ransomware: How To Protect Yourself - Science/Technology - Nairaland

Nairaland Forum / Science/Technology / Locky Ransomware: How To Protect Yourself (636 Views)

Chicken Dies After Killing A Snake While Trying To Protect Its Babies. Photos / Ransomware: How To Protect Your Computer From Being Held Hostage / Wannacry Ransomware & How To Protect Your System (2) (3) (4)

(1) (Reply)

Locky Ransomware: How To Protect Yourself by netafric: 6:08pm On Mar 24, 2016
https://afritechnet..com/2016/03/introducing-locky-ransomware.html

Businesses and individuals are being sent an email with a Microsoft Word attachment. The email claims that the attached document is an invoice or vital executable macro program. In reality the illegible ‘invoice’ and macro is a conduit for the infamous ransomware known as ‘Locky’ . Locky relies on social engineering more so than any great technical ingenuity to infect systems by advising the reader to enable macros so as to view the content of the attached document. Locky has successfully infected hundreds of computers in a number of European nations, Russia, the US, Pakistan, and Mali.

Once installed, Locky scans local drives (and networked drives) and encrypts files such as documents, images, music, videos, archives, database, and other web application-related files. Encrypted files are renamed and appended with a “.locky” extension. In a manner similar to other ransomware variants, a .txt file (_Locky_recover_instructions.txt) in numerous languages is left in every infected directory. The message directs victims to a Tor network to make payment in Bitcoins (0.5 BTC, roughly equal to $210).



How to protect against Locky


Locky has some weak points, apparently by design. For example, it won't execute on a computer that has its language settings set to Russian, which probably gives an approximate region of where its authors are located.

Locky tries to create registry key called "HKCU\Software\Locky. Locky will stop running if that key is created prior to infection.

Ransomware authors quickly improve their code, particularly after security researches publish weaknesses. Microsoft has taken steps to ensure that fewer people fall prey to macro-based infections.

https://afritechnet..com/2016/03/introducing-locky-ransomware.html

(1) (Reply)

Forget Apple Vs The Fbi: Whatsapp Just Switched On Encryption For A Billion Pple / Share Your Experience With The New MTN Data Plan / 16 Major Features Of Andriod 7.0 Nougat

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 7
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.