New strain of ransomware mimics Locky

Hades Locker is similar to Locky, but targets manufacturing and business services

Red skull and crossbones atop binary code

Security researchers have discovered a new ransomware campaign targeting manufacturing and business service sectors in Western Europe.

The campaign, dubbed Hades Locker, was detected in emails containing hyperlinks to a Microsoft Word document named "levering-1478529.doc" on several websites with recently registered domains.

In a blog post, the firm said it suspected a connection to previous CryptFile2 and MarsJoke campaigns that Proofpoint and others have documented based on the sending botnet and the distribution techniques (transportation-related email lures). Visually, Hades Lucker mimics early versions of Locky.

In contrast with these previous campaigns directed at state and local government agencies, however, Hades Locker targets manufacturing and business services.  

This malicious software alerted victims that their files were encrypted, by creating several types of files scattered throughout their file system.

"The ransom message is dropped to the victim's Desktop, as a text file, HTML file, and an image. The message urges the victim to "buy the decryption password belonging to your files." In order to do this, the victim is instructed to visit a web page or an onion site," the company said.

This website asks for one bitcoin (equivalent to 600 USD) in order to receive the decrypting software.

As a guarantee' that the decryption works, victims can also submit a single encrypted file and receive its decrypted version within 24 hours.

Proofpoint says: "Ransoms are increasing and actors are exploring new distribution methods such as links to hosted malware. As ransomware is increasingly commoditised and ransomware variants share features and aesthetics, we will continue to monitor the evolution of the market and its impact on businesses and individuals."

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021
Out-of-hours ransomware attacks have a greater impact on revenue
ransomware

Out-of-hours ransomware attacks have a greater impact on revenue

18 Nov 2021
US and Israel join forces to fight ransomware
ransomware

US and Israel join forces to fight ransomware

15 Nov 2021
Almost 70% of CISOs expect a ransomware attack
ransomware

Almost 70% of CISOs expect a ransomware attack

19 Oct 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021