Criminals Distribute Locky Ransomware To 2014 OPM Data Breach Victims

Criminals Distribute Locky Ransomware To 2014 OPM Data Breach Victims

To make the emails seem less suspicious, they all contain the signature of OPM account Manager Elis Lucas. Locky is one of the most potent forms of crypto-ransomware in existence today. Even though security researchers try to combat this malware, the developers remain one step ahead. In fact, a new phishing campaign distributing Locky ransomware has been discovered, which targets 22 potential victims. All of these users were part of the US Office of Personnel Management data breaches in 2014 and 2015. Criminals always find news ways to target potential victims with malware and ransomware.....


Related News

Worrisome Locky Ransomware Variant Zepto is Making The Rounds

There is a now form of Bitcoin ransomware on the block, going by the name of Zepto. At its core, this is a different variant of the Locky malware, which has been making the rounds for quite some time now. Security researchers detected a spike in the distribution of this new ransomware. As one would expect, Internet criminals are using spam emails to distribute this payload. Bitcoin ransomware has proven to be a very lucrative business, assuming one can distribute the malware on a large scale. Spam emails are a preferred method of distribution, as it allows criminals to reach a lot of....

Symantec Report Indicates End of Locky Ransomware Threat

Although malware threats and exploit kits are a significant threat to our society, various types are showing a decrease in activity. Angler, Locky, and Dridex are the three top categories which see less interest all of a sudden. For now, it remains unclear as to why this decrease is taking place, albeit it is possible criminals are turning toward new solutions. Ransomware and malware have been the top two threats since 2015. Many institutions and consumers have fallen victim to these threats, but it looks like Dridex and Locky are slowing down regarding usage. Moreover, the Angler exploit....

Industry Report: How Badly Was the DAO Attacked?

Scams, suits and cyber-attacks, with and a little bit of ransomware thrown in-between. It’s been a wacky week for Bitcoin and the DAO, and here are a few of the top stories: LOCKY GETS ROCKY. First, a little good news is in the mix. According to Symantec, Locky ransomware may be reaching the end of its days. Over the past two weeks, activity has practically been non-existent, although it’s unknown if this is due in part to a business decision to scale back. Otherwise, a disruption in the ransomware’s operations may have occurred. Joining Locky is Dridex, another form of financial malware....

Ransomware Developers Offer Customer Support To Help Pay Bitcoin Fee

Ransomware is a constant threat looking over our shoulders, and it sounds like internet criminals have once again upped the ante. Now that this business has become so very lucrative, cyber crooks have taken it upon themselves to provide a support page to affected victims. The way these support pages works is to guide affected users through the payment protocol. The majority of ransomware infections require victims to pay a fee in Bitcoin, and a lot of people have trouble with obtaining cryptocurrency. A service desk for victims has been created by the developers of CryptoWall and....

Necurs Botnet Resurfaces With Updated Locky and Dridex Versions

Locky remains one of the biggest ransomware threats to this very date. Now that the Necurs botnet is back, it looks like a new version of Locky Bitcoin ransomware is available as well. A new spam campaign is underway to infect as many computers as possible. Roughly three weeks ago, the Necurs botnet suddenly went offline, leaving security researchers puzzled as to what happened to it. This reprieve was rather short-lived, however, as the botnet returned in full force a few days ago. Moreover, it is spreading an improved version of both Locky ransomware and the Dridex banking trojan. Necurs....