{"id":2446,"date":"2024-09-25T18:15:52","date_gmt":"2024-09-25T18:15:52","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2446"},"modified":"2025-07-29T03:44:21","modified_gmt":"2025-07-29T03:44:21","slug":"locky-emerges-out-of-hibernation-hits-20-million-mailboxes","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/locky-emerges-out-of-hibernation-hits-20-million-mailboxes\/","title":{"rendered":"Locky emerges out of hibernation, hits 20 million mailboxes"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"449\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky.webp\" alt=\"\" class=\"wp-image-2464\" style=\"width:601px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Version:1.0 StartHTML:000000289 EndHTML:000019321 StartFragment:000007098 EndFragment:000019253 StartSelection:000007098 EndSelection:000019249 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=71&amp;url=Locky%20emerges%20out%20of%20hibernation,%20hits%2020%20million%20mailboxes LMNTRIX Labs LMNTRIX Labs<\/p>\n\n\n\n<p>After disappearing for months, Locky ransomware is back\u2026 and in force. The strain first made headlines in February 2016 when a US medical centre paid a <a href=\"http:\/\/www.zdnet.com\/article\/hospital-pays-hackers-17000-in-bitcoins-to-return-computer-network\/\" target=\"_blank\" rel=\"noopener\">US$17,000<\/a> bitcoin ransom to retrieve patient data \u2013 operators said paying the ransom was the quickest way to resume caring for patients. &nbsp;<br><br>In this latest campaign, Locky is primarily being distributed via email as a word document invoice. In just one day last month, more than <a href=\"http:\/\/www.zdnet.com\/article\/this-giant-ransomware-campaign-just-sent-millions-of-malware-spreading-emails\/\" target=\"_blank\" rel=\"noopener\">20 million phishing emails<\/a> suddenly appeared, flooding inboxes with the ransomware.&nbsp;<br><br><strong>Delivery: <\/strong>The following table shows a list of malicious domains from which the Locky ransomware has been downloaded:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"343\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky1-1024x343.webp\" alt=\"\" class=\"wp-image-2447\"\/><\/figure>\n\n\n\n<p><em>Figure 1 Malicious domain which downloads Locky ransomware<\/em><br><br>Security researchers have observed a number of distribution methods, the most popular of which has been an email phishing campaign:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"217\" height=\"214\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky2-1.webp\" alt=\"\" class=\"wp-image-2449\"\/><\/figure>\n\n\n\n<p><em>Figure 2 Malicious Email Attachment<\/em><br><br>This email attachment contains a zip file in which a Visual Basic Script (VBS) file is hidden. Once clicked, the victim downloads the latest Locky ransomware. The actual contact point for downloading the latest Locky sample is greatesthits(.)mygoldmusic(.)com \u2013 a known malware site, as shown below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"527\" height=\"396\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky3.webp\" alt=\"\" class=\"wp-image-2450\"\/><\/figure>\n\n\n\n<p><em>Figure 3 VT hits for malicious domain<\/em><br><br>Further analysis on the same domain shows it is linked to at least half a dozen malware samples:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"707\" height=\"538\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky4.webp\" alt=\"\" class=\"wp-image-2451\"\/><\/figure>\n\n\n\n<p><em>Figure 4 Latest Locky samples from greatesthits mygold music (malicious domain)<\/em><br><br>In addition to the malicious Word document, we have also seen a fake Dropbox account verification email used to distribute the malware. Upon clicking the link, the victim is directed to a spoofed Dropbox page. The user is told their account cannot be verified:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"355\" height=\"162\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky5.webp\" alt=\"\" class=\"wp-image-2452\"\/><\/figure>\n\n\n\n<p><em>Figure 5 Fake Dropbox page<\/em><br><br>Below are the Virus Total hits for the fake Dropbox URL:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"493\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky6-1024x493.webp\" alt=\"\" class=\"wp-image-2454\"\/><\/figure>\n\n\n\n<p><em>Figure 6 Fake Dropbox url (VT hits for malicious url)<\/em><br><br>The user is then told to download a javascript file. If the user opens this js file, their machine is locked with Locky ransomware.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"363\" height=\"97\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky7.webp\" alt=\"\" class=\"wp-image-2456\"\/><\/figure>\n\n\n\n<p><em>Figure 7 Downloading file<\/em><br><br><strong>Infection \u2013 Behavioural Analysis:<\/strong><br><br>MD5: 6480fc6b8c2d76965520d5184b5190a1<br><br>File type\/size: VBS file\/43 KB.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"497\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky8-1024x497.webp\" alt=\"\" class=\"wp-image-2457\"\/><\/figure>\n\n\n\n<p>This script drops the ransomware and associated files: C44DEDDA.exe, csrss.exe, 814C2B0A.exe, 0208oi[1].exe and rad8D858.tmp. We then executed these files in our controlled environment:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"557\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky9-1024x557.webp\" alt=\"\" class=\"wp-image-2458\"\/><\/figure>\n\n\n\n<p><em>Figure 8 Execution of malicious files<\/em><br><br>All these files seek open ports and create new run entries:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;Client Server Runtime Subsystem&#8221;<br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Type: REG_SZ<br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Data: &#8220;C:\\Documents and Settings\\All Users\\Application Data\\Windows\\csrss.exe&#8221;<br>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;CSRSS&#8221;<br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Type: REG_SZ<br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Data: &#8220;C:\\Documents and Settings\\All Users\\Application Data\\Drivers\\csrss.exe&#8221;<br>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;NetworkSubsystem&#8221;<br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Type: REG_SZ<br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Data: &#8220;C:\\Documents and Settings\\All Users\\Application Data\\Csrss\\csrss.exe&#8221;<br>These new run entries allow Locky to keep persistence as each is copied into a separate location under the file name csrss.exe.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"255\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky10-1024x255.webp\" alt=\"\" class=\"wp-image-2459\"\/><\/figure>\n\n\n\n<p><em>Figure 9 csrss.exe created in %appdata% location<\/em><br><br>In the memory strings, we found the following router list details:<br><br>\u2022&nbsp;&nbsp; &nbsp;router_purpose_to_string<br><br>\u2022&nbsp;&nbsp; &nbsp;router_get_all_orports<br><br>\u2022&nbsp;&nbsp; &nbsp;D27178388FA75B96D37FA36E0B015227DDDBDA51<br><br>\u2022&nbsp;&nbsp; &nbsp;B59F6E99C575113650C99F1C425BA7B20A8C071D<br><br>\u2022&nbsp;&nbsp; &nbsp;A61682F34B9BB9694AC98491FE1ABBFE61923941<br><br>\u2022&nbsp;&nbsp; &nbsp;9DCD8E3F1DD1597E2AD476BBA28A1A89F3095227<br><br>\u2022&nbsp;&nbsp; &nbsp;9904B52336713A5ADCB13E4FB14DC919E0D45571<br><br>\u2022&nbsp;&nbsp; &nbsp;98CC82342DE8D298CF99D3F1A396475901E0D38E<br><br>\u2022&nbsp;&nbsp; &nbsp;87326329007AF781F587AF5B594E540B2B6C7630<br><br>\u2022&nbsp;&nbsp; &nbsp;57B85409891D3FB32137F642FDEDF8B7F8CDFDCD<br><br>\u2022&nbsp;&nbsp; &nbsp;0E7E9C07F0969D0468AD741E172A6109DC289F3C<br><br>\u2022&nbsp;&nbsp; &nbsp;09CD84F751FD6E955E0F8ADB497D5401470D697E<br><br>\u2022&nbsp;&nbsp; &nbsp;download_status_reset_by_sk_in_cl<br><br>\u2022&nbsp;&nbsp; &nbsp;routerlist.c<br><br>\u2022&nbsp;&nbsp; &nbsp;dlstatus<br><br>\u2022&nbsp;&nbsp; &nbsp;download_status_is_ready_by_sk_in_cl<br><br>\u2022&nbsp;&nbsp; &nbsp;certs_out<br><br>\u2022&nbsp;&nbsp; &nbsp;authority_cert_get_all<br><br>\u2022&nbsp;&nbsp; &nbsp;fp-sk\/<br><br>A static search of the memory strings found there is already information on github (https:\/\/github.com\/kaist-ina\/SGX-Tor\/blob\/master\/Enclave\/TorSGX\/routerlist.c) which maintains a global list of router information for known servers.&nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;$F397038ADC51336135E7B80BD99CA3844360292B~F397038ADC51336135E at 76.73.17.194<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Documents and Settings\\Application Data\\tor<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Documents and Settings\\Application Data\\tor\\torrc<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Documents and Settings\\Application Data\\tor\\torrc-defaults<br><br>\u2022&nbsp;&nbsp; &nbsp;WARN BOOTSTRAP PROGRESS=5 TAG=conn_dir SUMMARY=&#8221;Connecting to directory server&#8221; WARNING=&#8221;No route to host [WSAEHOSTUNREACH ]&#8221; REASON=NOROUTE COUNT=3 RECOMMENDATION=warn<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows XP<br><br>\u2022&nbsp;&nbsp; &nbsp;F397038ADC51336135E7B80BD99CA3844360292B<br><br>The above global router information shows the application path and connection information for the available directory server. These can be exploited in the ransomware payload to make successful TOR connections.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"607\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky11-1024x607.webp\" alt=\"\" class=\"wp-image-2461\"\/><\/figure>\n\n\n\n<p><em>Figure 10 after infection of Locky ransomware<\/em><br><br>After successful infection, the victim\u2019s desktop wallpaper is changed to a Locky ransomware message. It asks the victim to open one of a dozen readme files. These can be found on the desktop and in the C: folder:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"401\" height=\"335\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky12.webp\" alt=\"\" class=\"wp-image-2462\"\/><\/figure>\n\n\n\n<p><em>Figure 11 Readme files and crypted file<\/em><br><br>Below is the ransom note victims see:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"863\" height=\"503\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Locky13.webp\" alt=\"\" class=\"wp-image-2463\"\/><\/figure>\n\n\n\n<p><strong>Threat Indicators \u2013 IOC details:<br><br>Fake Dropbox URL:<\/strong><br><br>hxxp:\/\/busad(.)com\/dropbox.html<br><br>hxxp:\/\/autoecoledufrene(.)com\/dropbox.html<br><br>hxxp:\/\/autoecoleboisdesroches(.)com\/dropbox.html<br><br>hxxp:\/\/tasgetiren(.)com\/dropbox.html<br><br>hxxp:\/\/potamitis(.)gr\/dropbox.html<br><br>hxxp:\/\/jaysonmorrison(.)com\/dropbox.html<br><br>hxxp:\/\/arthurdenniswilliams(.)com\/dropbox.html<br><br>hxxp:\/\/gruporoados(.)com\/dropbox.html<br><br>hxxp:\/\/patrickreeves(.)com\/dropbox.html<br><br>hxxp:\/\/eifel-netz(.)de\/dropbox.html<br><br>hxxp:\/\/albion-cx22(.)co.uk\/dropbox.html<br><br>hxxp:\/\/jakuboweb(.)com\/dropbox.html<br><br>hxxp:\/\/flooringforyou(.)co.uk\/dropbox.html<br><br>hxxp:\/\/binarycousins(.)com\/dropbox.html<br><br>hxxp:\/\/dar-alataa(.)com\/dropbox.html<br><br>hxxp:\/\/gestionale-orbit(.)it\/dropbox.html<br><br>hxxp:\/\/aegelle(.)com\/dropbox.html<br><br>hxxp:\/\/griffithphoto(.)com\/dropbox.html<br><br>hxxp:\/\/fachwerkhaus(.)ws\/dropbox.html<br><br>hxxp:\/\/melting-potes(.)com\/dropbox.html<br><br>hxxp:\/\/willemshoeck.nl\/dropbox.html<br><br>hxxp:\/\/benjamindiggles(.)com\/dropbox.html<br><br>hxxp:\/\/avtokhim(.)ru\/dropbox.html<br><br>hxxp:\/\/autoecoleathena(.)com\/dropbox.html<br><br>hxxp:\/\/bayimpex(.)be\/dropbox.html<br><br><strong>IP addresses:<\/strong><br><br>176(.)56(.)58(.)114<br><br>185(.)18(.)197(.)109<br><br>173(.)192(.)66(.)137<br><br>203(.)183(.)65(.)225<br><br>194(.)173(.)175(.)16<br><br>62(.)4(.)8(.)233<br><br>67(.)19(.)68(.)83<br><br>47(.)89(.)249(.)74&nbsp;<br><br>199(.)30(.)241(.)139<br><br>202(.)237(.)149(.)19<br><br>66(.)84(.)8(.)235<br><br>83(.)169(.)22(.)79<br><br>91(.)121(.)111(.)185 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>91(.)209(.)7(.)116<br><br>91(.)234(.)195(.)48<br><br><strong>Locky download and related URL:<\/strong><br><br>gbass(.)ch\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>garage-fiat(.)be\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>futurehemp(.)com\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>furukawa-iin(.)net\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<br><br>freevillemusic(.)com\/tJHGskdioj<br><br>vinneydropmodorfosius(.)net\/af\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<br><br>hightechavenue(.)com\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>greatesthits.mygoldmusic(.)com\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>graficasicarpearanjuez(.)com\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>goldenspikerails(.)net\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>hecam(.)de\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>hdvmedia(.)nl\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>go-coo(.)jp\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>gewinnspiel-sachsenhausen(.)de\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<br><br>gestione.easyreplica(.)com\/tJHGskdioj &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<br><br><strong>Pattern of php files in malicious URL:<\/strong><br><br>Regex for the php file: \\\/w\\\/[0-9a-z]{4}\\.php<br><br>konferencjaora[.]pl\/w\/523f.php<br><br>autonikos[.]pl\/w\/6dty.php<br><br>oxfordschoolkotputli[.]com\/w\/vait.php<br><br>j3[.]rodolfogn[.]com\/w\/qn0b.php<br><br>martinagebhardt[.]hu\/w\/uol4.php<br><br><strong>Ransom note:<\/strong><br><br>To decrypt the files you should send the following code: 647698A1C322BA348201|801|6|2<br><br><strong>Email: <\/strong>Novikov(.)Vavila(at)gmail(.)com<br><br><strong>Tor addresses in the ransom note:<\/strong><br><br>hxxp:\/\/cryptsen7fo43rr6(.)onion\/<br><br>hxxp:\/\/cryptsen7fo43rr6(.)onion.to\/<br><br>hxxp:\/\/cryptsen7fo43rr6(.)onion(.)cab\/<br><br><strong>Extension: <\/strong>647698A1C322BA348201.crypted000007<br><br><strong>Conclusion:<\/strong> As long as Locky continues to successfully encrypt victim machines, it will continue resurfacing. We recommend users apply the IOC details as alerts, in order to block the infection methods (in this case, the malicious zip file and fake Dropbox links used to distribute Locky).&nbsp;<br><br>As always, exercise caution when receiving emails with attachments from unknown users. Finally, updated anti-malware with anti-ransomware modules can help protect against ransomware attacks.<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Version:1.0 StartHTML:000000289 EndHTML:000019321 StartFragment:000007098 EndFragment:000019253 StartSelection:000007098 EndSelection:000019249 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=71&amp;url=Locky%20emerges%20out%20of%20hibernation,%20hits%2020%20million%20mailboxes LMNTRIX Labs LMNTRIX Labs After disappearing for months, Locky ransomware is back&hellip; and in force. The strain first made headlines in February 2016 when a US medical centre paid a US$17,000 bitcoin ransom to retrieve patient data &ndash; operators said paying the ransom was the quickest way [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2464,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2446"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2446\/revisions"}],"predecessor-version":[{"id":4258,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2446\/revisions\/4258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2464"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}