August 16, 2016 By Douglas Bonderud 3 min read

Locky ransomware is a big player in the encrypted file market. As noted by IT Pro Portal, two-thirds of all malicious emails in Q2 2016 contained Locky, and other malware-makers have been imitating this popular attack vector to intimidate users and convince them to pay up.

Not willing to rest on their laurels, however, it seems the creators of Locky have headed south and added a few new tricks to their arsenal. According to Trend Micro, the ransomware was recently spotted in the Brazilian underground market using Windows Script Files (WSF) to improve their delivery method. Here’s a look at what’s next on the hit list for Locky.

Locky Ransomware Keeps Moving

Like a boxer avoiding the knockout blow, Locky’s creators keep moving, constantly changing tactics to make sure security researchers can’t get a fix on their position. It’s such an effective strategy that other forms of ransomware, such as PowerWare, are trying to pass themselves off as Locky to spook users into paying the ransom.

As noted by Threatpost, PowerWare is “relatively lame compared to Locky,” since it only uses AES-128 encryption to lock down the first 2,048 bytes of target files. What’s more, researchers have already developed a Python script that can extract the static decryption key from PowerWare code and save user files.

Cashing in on Fear

With Locky, however, it’s a different story. Many users choose to pay up rather than risk the wrath of this ransomware. To cash in on the fear, PowerWare has started encrypting its files with a .locky extension to make it seem like victims are in serious trouble.

According to the Trend Micro piece, the Locky ransomware isn’t above borrowing from its competitors where warranted: New discoveries of the code in Brazil show it using the same kind of WSF delivery techniques leveraged by this year’s Cerber email campaign.

As discussed by SC Magazine, this relatively new technique is paying big dividends because WSFs let attackers use more than one scripting language in a single file. Since these files aren’t on the list of typically malicious payloads, they’re not present on most watchlists.

Blacklisting is also problematic because these files have different hashes for different types of malware; one recent variant looked like a legitimate Yahoo Widget. When it comes to infection, it seems the Brazilian brand of Locky is targeting companies with file attachments in spam emails using subject lines such as “bank account record,” “annual report” or “company database.”

Batten Down the Hatches

It’s no surprise that cybersecurity experts have been on high alert for scams surrounding Brazil’s global sporting event. Brazil has always been a hotbed for this kind of digital crime, with experts reporting $8 billion per year in losses from cybercrime.

Why the big market? In large measure, it’s because cybersecurity hasn’t caught up to attack volume, leading to a market where most malware lacks sophistication but gets the job done. With cyber law enforcement still in its infancy, the Brazilian digital underground is the perfect place for Locky ransomware creators to take a breather, examine their code and develop new ways to infiltrate corporate computers.

The Brazilian cybercrime market is effectively a staging ground — a great place for smash-and-grab coders to ply their wares and more powerful tools like Locky to hone their craft. It’s the second half of this scenario that should worry companies. With Locky adding new tricks to its arsenal, testing them on the Brazilian market and then bringing them to bear stateside, it’s worth battening down the digital hatches and making sure network defenses are prepared for the new WSF war.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today