{"id":235432,"date":"2017-08-18T02:04:09","date_gmt":"2017-08-18T06:04:09","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nasty-locky-ransomware-is-back-and-now-its-worse-than-ever-komando.php"},"modified":"2017-08-18T02:04:09","modified_gmt":"2017-08-18T06:04:09","slug":"nasty-locky-ransomware-is-back-and-now-its-worse-than-ever-komando","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/tor-browser\/nasty-locky-ransomware-is-back-and-now-its-worse-than-ever-komando.php","title":{"rendered":"Nasty Locky ransomware is back, and now it&#8217;s worse than ever &#8211; Komando"},"content":{"rendered":"<p><p>    Ransomware has been the largest cybersecurity threat in the    world for over a year now. Over that time we've seen a number    of massive attacks. The WannaCry variant that occurred    earlier this year in May was extremely nasty, locking up    hundreds of thousands of computers in over 150 countries.  <\/p>\n<p>    One of the first known ransomware attacks to hit the scene was    dubbed Locky, but it hasn't been prevalent in a while. Until    now. A new Locky ransomware variant is spreading and you need    to know what to watch for.  <\/p>\n<p>    Researchers at Comodo Threat Intelligence Lab recently    discovered a new Locky variant dubbed IKARUSdilapidated. It is    being distributed through phishing emails that contain little    to no content. The email does, however, have a malicious file    attached to it.  <\/p>\n<p>    The attachment is either a Word document, PDF, archive zip    file, or image file. If the recipient executes the attachment,    it infects their gadget with IKARUSdilapidated ransomware.  <\/p>\n<p>    A Comodo spokesperson said, \"When the user opens the attached    document, it appears to be full of garbage, and it includes the    phrase 'Enable macro if data encoding is incorrect' - a social    engineering technique used in this type of phishing attack. If    the user does as instructed, the macros then save and run a    binary file that downloads the actual encryption Trojan.\"  <\/p>\n<p>    Here is an example of what the email looks like:  <\/p>\n<\/p>\n<p>    Once the victim's gadget is infected with the ransomware, a    message appears instructing them to download the Tor browser. Then, a ransom    of up to $1,200 is demanded that the victim is told to pay    using bitcoin.  <\/p>\n<p>    So far, there have been tens of thousands of these phishing    emails delivered. The cybercriminals are using botnets to send    the malicious emails.  <\/p>\n<p>    (Note:A botnet is a group of    gadgetsthat hackers have taken over without the owner's    knowledge. The hackers seize control of unwitting    gadgetswith a virus, and then use the network of infected    computersto perform large-scale hacks or scams.)  <\/p>\n<p>    As you can see, this is a very elaborate scam. Phishing emails,    botnets, and ransomware are all used in this attack to scam    people out of money. That's why you really need to know how to    avoid falling victim to this attack.  <\/p>\n<p>    The best way to defeat a ransomware attack is to    takeprecautionary steps. Here are suggestions that will    help:  <\/p>\n<p>    Backing up your critical data is an important safety precaution    in the fight against ransomware. It's the best way to recover    your files without paying a ransom.  <\/p>\n<p>    We recommend using our sponsorIDrive. You can backup all your    PCs, Macs and mobile devices into ONE account for one low cost!    Be sureand use promo    codeKimto receive an exclusive    offer.  <\/p>\n<p>    Click here to receive a special discount from IDrive    using promo code Kim.  <\/p>\n<p>    How to spot disguised malicious    files before they infect your computer  <\/p>\n<p>    5 good habits that immensely    improve your online security  <\/p>\n<p>    Scammers targeting job hunters    with new phishing attack  <\/p>\n<p>      Please share this information with everyone. Just click on      any of these social media buttons.    <\/p>\n<p>      Previous Happening Now    <\/p>\n<p>      Random Happening Now    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.komando.com\/happening-now\/414359\/nasty-locky-ransomware-is-back-and-now-its-worse-than-ever\" title=\"Nasty Locky ransomware is back, and now it's worse than ever - Komando\">Nasty Locky ransomware is back, and now it's worse than ever - Komando<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ransomware has been the largest cybersecurity threat in the world for over a year now.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/tor-browser\/nasty-locky-ransomware-is-back-and-now-its-worse-than-ever-komando.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261457],"tags":[],"class_list":["post-235432","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/235432"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=235432"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/235432\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=235432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=235432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=235432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}