August 16, 2016 By Douglas Bonderud 3 min read

Locky ransomware is a big player in the encrypted file market. As noted by IT Pro Portal, two-thirds of all malicious emails in Q2 2016 contained Locky, and other malware-makers have been imitating this popular attack vector to intimidate users and convince them to pay up.

Not willing to rest on their laurels, however, it seems the creators of Locky have headed south and added a few new tricks to their arsenal. According to Trend Micro, the ransomware was recently spotted in the Brazilian underground market using Windows Script Files (WSF) to improve their delivery method. Here’s a look at what’s next on the hit list for Locky.

Locky Ransomware Keeps Moving

Like a boxer avoiding the knockout blow, Locky’s creators keep moving, constantly changing tactics to make sure security researchers can’t get a fix on their position. It’s such an effective strategy that other forms of ransomware, such as PowerWare, are trying to pass themselves off as Locky to spook users into paying the ransom.

As noted by Threatpost, PowerWare is “relatively lame compared to Locky,” since it only uses AES-128 encryption to lock down the first 2,048 bytes of target files. What’s more, researchers have already developed a Python script that can extract the static decryption key from PowerWare code and save user files.

Cashing in on Fear

With Locky, however, it’s a different story. Many users choose to pay up rather than risk the wrath of this ransomware. To cash in on the fear, PowerWare has started encrypting its files with a .locky extension to make it seem like victims are in serious trouble.

According to the Trend Micro piece, the Locky ransomware isn’t above borrowing from its competitors where warranted: New discoveries of the code in Brazil show it using the same kind of WSF delivery techniques leveraged by this year’s Cerber email campaign.

As discussed by SC Magazine, this relatively new technique is paying big dividends because WSFs let attackers use more than one scripting language in a single file. Since these files aren’t on the list of typically malicious payloads, they’re not present on most watchlists.

Blacklisting is also problematic because these files have different hashes for different types of malware; one recent variant looked like a legitimate Yahoo Widget. When it comes to infection, it seems the Brazilian brand of Locky is targeting companies with file attachments in spam emails using subject lines such as “bank account record,” “annual report” or “company database.”

Batten Down the Hatches

It’s no surprise that cybersecurity experts have been on high alert for scams surrounding Brazil’s global sporting event. Brazil has always been a hotbed for this kind of digital crime, with experts reporting $8 billion per year in losses from cybercrime.

Why the big market? In large measure, it’s because cybersecurity hasn’t caught up to attack volume, leading to a market where most malware lacks sophistication but gets the job done. With cyber law enforcement still in its infancy, the Brazilian digital underground is the perfect place for Locky ransomware creators to take a breather, examine their code and develop new ways to infiltrate corporate computers.

The Brazilian cybercrime market is effectively a staging ground — a great place for smash-and-grab coders to ply their wares and more powerful tools like Locky to hone their craft. It’s the second half of this scenario that should worry companies. With Locky adding new tricks to its arsenal, testing them on the Brazilian market and then bringing them to bear stateside, it’s worth battening down the digital hatches and making sure network defenses are prepared for the new WSF war.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today