Analysis of the Locky infection process

In recent months, there has been a significant increase in the number of networks and users affected by ransomware known as Locky, which is used to encrypt a victim’s files and then demand a ransom to be paid in bitcoins. But, how does this threat manage to infiltrate computer systems and hijack data? From the ESET Research Lab in … More Analysis of the Locky infection process

Ransomware threat highlights why backing up data is essential

Noticeably, over the last two years, there has been a marked increase in ransomware attacks, which is, in its simplest form, a type of malware that is executed for the principal reason of extortion. The malicious software, once deployed, encrypts data, as well as devices. Access is only achievable if the victim pays a ransom … More Ransomware threat highlights why backing up data is essential

The security review: What you need to know about Locky

Welcome to this week’s security review, which includes the Locky threat, the nuisance of Robocalls, another celeb-related iCloud breach and a warning from the FBI that cars are vulnerable to cyberattacks. Trojan Downloaders on the rise: Don’t let Locky or TeslaCrypt ruin your day ESET’s Josep Albors and Raphael Labaca Castro revealed that weeks after … More The security review: What you need to know about Locky

Trojan Downloaders on the rise: Don’t let Locky or TeslaCrypt ruin your day

Weeks after it started attacking and encrypting victims’ files, Locky is still targeting many users. In order to provide more information about this threat, we have put together some information to help protect you in a better way. Short summary Win32/Filecoder.Locky.A is a ransomware variant that encrypts files with over 100 file types such as images, videos, databases, … More Trojan Downloaders on the rise: Don’t let Locky or TeslaCrypt ruin your day