Notebookcheck
, , , , , ,
search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
 

Beware! Ransomware Locky and Mamba on the prowl again

Ransomware Locky and Mamba have started rearing their ugly heads again. (Source: 2-Spyware)
Ransomware Locky and Mamba have started rearing their ugly heads again. (Source: 2-Spyware)
Variants of ransomware Locky and Mamba have resurfaced and are more lethal than ever. Those unfortunate to be infected, risk encryption of the entire HDD and need to cough up a huge sum of money for decryption and recovery of their data.
, , , , , ,
search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
 

Two major ransomware, Locky and Mamba, that have been the subject of much discussion last year, have returned back to continue their onslaught on enterprises and gullible consumers. Locky first surfaced in 2016 and has been one of the most commonly distributed ransomware. Many variants of the ransomware exist and are spread via the Necurs and Dridex botnets. The current variant that is taking host systems for hostage is Diablo6. Diablo6 is currently prevalent in the United States and Austria. Indian businesses have started pressing the panic button after the attack hit systems in India this August.

Locky is distributed via email spam campaigns that contain a subject line resembling 'E yyyy-mm-dd (xxx).docx'. The body of the email reads, "Files attached. Thanks." and contains the attachment  'yyyy-mm-dd (xxx).zip'. The ZIP file contains a VisualBasic script that connects to malicious domains to download and execute Locky Diablo6. There is also another email campaign that distributes a PDF file named similar to IMG_xxxx.pdf that contains a .docm file containing macros. If a gullible user opens the .docm file in Microsoft Word and enables the macro, the code downloads Locky from a malicious server. Once downloaded, Locky encrypts files using the RSA-2048 encryption algorithm and asks the user to install the Tor browser to visit the hacker's site for payment instructions. The user's files are encrypted with the .diablo6 extension and the hacker needs to be paid 0.49 Bitcoin (US$ 2079) to get a decryption key. Public decryption keys are currently not available.

Locky Diablo6 encrypts important files on the hard drive and demands a huge ransom for the decryption key. (Source: The Hacker News)
Locky Diablo6 encrypts important files on the hard drive and demands a huge ransom for the decryption key. (Source: The Hacker News)

Mamba is the more lethal of the two as it encrypts the entire hard drive rendering the system totally unusable. Mamba seems to employ destructive tactics on large corporate establishments rather than extorting them for money. Last year, it managed to bring down the San Francisco Municipal Transportation Agency to its knees forcing the authorities to allow free travel until the computers were fixed. It has now resurfaced again in Saudi Arabia and Brazil in a more lethal form. The malware could spread via compromised websites or malicious email campaigns. Mamba utilizes the free Windows disk encryption software, DiskCryptor, to encrypt the entire hard drive of the victim. Once encrypted, the system reboots and displays a message on the screen asking the victims to write to '[email protected]' or '[email protected]' for the decryption key. There is no price asked outright for the decryption but the hacker decides the rate based on the number of computers affected. 

Mamba is more lethal and can encrypt the entire HDD including the Master File Table. (Source: The Hacker News)
Mamba is more lethal and can encrypt the entire HDD including the Master File Table. (Source: The Hacker News)

2017 has been giving a hard time to cybersecurity researchers. First it was the WannaCry and Petya/NotPetya attacks that took large corporations to ransom and now older attacks are resurfacing in more lethal forms. We recommend that all users exercise caution while surfing the web and beware of suspicious email attachments or other communication asking for personally identifiable information. As always, take regular backups of your data and store them offsite. Make sure you secure your system with the latest OS/software updates and up to date antivirus software.

Source(s)

, , , , , ,
search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
 
static version load dynamic
Loading Comments
Comment on this article
Vaidyanathan Subramaniam
Vaidyanathan Subramaniam - Managing Editor - 1355 articles published on Notebookcheck since 2012
Though a cell and molecular biologist by training, I have been drawn towards computers from a very young age ever since I got my first PC in 1998. My passion for technology grew quite exponentially with the times, and it has been an incredible experience from being a much solicited source for tech advice and troubleshooting among family and friends to joining Notebookcheck in 2017 as a professional tech journalist. Now, I am a Lead Editor at Notebookcheck covering news and reviews encompassing a wide gamut of the technology landscape for Indian and global audiences. When I am not hunting for the next big story or taking complex measurements for reviews, you can find me unwinding to a nice read, listening to some soulful music, or trying out a new game.
contact me via: @Geeky_Vaidy
Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > News Archive > Newsarchive 2017 08 > Beware! Ransomware Locky and Mamba on the prowl again
Vaidyanathan Subramaniam, 2017-08-18 (Update: 2017-08-18)