The Gulf Breeze, Fla.-based cybersecurity company, which focuses on email and web protection services, said it identified a “large spike in malware traffic” Aug. 28. The emails utilized the following subject lines: “please print,” “documents,” “photo,” “images,” “scans” and “pictures.”
Each email included a ZIP attachment containing a file that initiated a sequence of events, eventually downloading the latest Locky ransomware. Locky was one of the most frequently detected ransomware variants in 2016, although it had waned in prevalence in recent months.
After the Locky ransomware encrypts a target’s files, it leaves decryption instructions demanding 0.5 in bitcoins, or roughly $2,150.
Click here to view the blog post.
More articles on cybersecurity:
CVS Caremark exposes patients’ HIV statuses via envelop windows
GAO: Federal efforts to curb use of SSNs see ‘limited success’
Kaleida Health reports 2nd phishing attack in 2 months