Hacked the server that serves Locky ransomware

Security company F-Secure appears to have discovered a strange sample “υ” originating from the server network (), which distributes the Locky ransomware.Locky

Φυσιολογικά το malware ήταν ένα αρχείο ZIP σε μορφή JavaScript. Αν τώρα κάποιος χρήστης κάνει διπλό κλικ πάνω σε αυτό το JavaScript, το would normally download the Locky ransomware which would immediately start encrypting the victim's data.

But this time, F-Secure researcher Päivi discovered that instead of Lócky, JavaScript put something different and completely harmless!

How is the event explained?

It seems that someone has violated Lócky's distribution network and replaced Locky ransomware with a file that is totally harmless.

The file simply shows a pre if someone goes to open it, which says: “don't open email attachments from untrusted sources.”

"You have already opened a malicious file to read this message,
For your own safety, do not open email attachments from unreliable sources. ”

lock

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).