Locky ransomware has evolved its attack method, using the AESIR-file extension and disguising itself as emails from legitimate companies. It has also been found to spread through Facebook Messenger by mimicking an image. There is currently no way to decrypt Locky ransomware, so the only way to recover files is through a backup. The constantly evolving program and delivery methods make Locky ransomware difficult to combat. It has been particularly targeting the healthcare industry in recent months.
JLR ‘cyber shockwave ripping through UK industry’ as supplier share price plummets by 55%
Alexander Martin reports: Shares in a British automaker supplier plummeted 55% Wednesday as it warned that a cyberattack on Jaguar Land Rover (JLR) was impacting