Cisco Blog >Threat Research

Threat Research

This post was authored byNick Biasini

Throughout the majority of 2016, Locky was the dominant ransomware in the threat landscape. It was an early pioneer when it came to using scripting formats Windows hosts would natively handle, like .js, .wsf, and .hta. These scripting formats acted as a vehicle to deliver the payload via email campaigns. However, late in 2016 Locky distribution declined dramatically largely due to the slowdown of Necurs that occurred at the same time.

On April 21st, Talos observed the first large scale Locky campaign in months from Necurs. This campaign leveraged techniques associated with a recent Dridex campaign and is currently being distributed in very high volumes. Talos has seen in excess of 35K emails in the last several hours associated with this newest wave of Locky. This large wave of distribution has been attributed to the Necurs botnet which, until recently, had been focused on more traditional spam such aspump-and-dump spam, Russian dating spam, and work-from-home spam.

[Attachment]

Read More »

Tags:

Cisco Systems Inc. published this content on 21 April 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 21 April 2017 18:53:22 UTC.

Original documenthttps://blogs.cisco.com/security/talos/locky-returns-necurs

Public permalinkhttp://www.publicnow.com/view/D594762BD14B73630040904487B820BFED003340