New strain of ransomware mimics Locky

Hades Locker is similar to Locky, but targets manufacturing and business services

Security researchers have discovered a new ransomware campaign targeting manufacturing and business service sectors in Western Europe.

The campaign, dubbed Hades Locker, was detected in emails containing hyperlinks to a Microsoft Word document named "levering-1478529.doc" on several websites with recently registered domains.

In a blog post, the firm said it suspected a connection to previous CryptFile2 and MarsJoke campaigns that Proofpoint and others have documented based on the sending botnet and the distribution techniques (transportation-related email lures). Visually, Hades Lucker mimics early versions of Locky.

In contrast with these previous campaigns directed at state and local government agencies, however, Hades Locker targets manufacturing and business services.  

Advertisement
Advertisement - Article continues below

This malicious software alerted victims that their files were encrypted, by creating several types of files scattered throughout their file system.

"The ransom message is dropped to the victim's Desktop, as a text file, HTML file, and an image. The message urges the victim to "buy the decryption password belonging to your files." In order to do this, the victim is instructed to visit a web page or an onion site," the company said. This website asks for one bitcoin (equivalent to 600 USD) in order to receive the decrypting software. As a guarantee' that the decryption works, victims can also submit a single encrypted file and receive its decrypted version within 24 hours.

Proofpoint says: "Ransoms are increasing and actors are exploring new distribution methods such as links to hosted malware. As ransomware is increasingly commoditised and ransomware variants share features and aesthetics, we will continue to monitor the evolution of the market and its impact on businesses and individuals."

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019