Locky ransomware has evolved its attack method, using the AESIR-file extension and disguising itself as emails from legitimate companies. It has also been found to spread through Facebook Messenger by mimicking an image. There is currently no way to decrypt Locky ransomware, so the only way to recover files is through a backup. The constantly evolving program and delivery methods make Locky ransomware difficult to combat. It has been particularly targeting the healthcare industry in recent months.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some