cognitive cybersecurity intelligence

News and Analysis

Search

Don’t call it a comeback: Locky ransomware ups attack methods

Locky ransomware has evolved its attack method, using the AESIR-file extension and disguising itself as emails from legitimate companies. It has also been found to spread through Facebook Messenger by mimicking an image. There is currently no way to decrypt Locky ransomware, so the only way to recover files is through a backup. The constantly evolving program and delivery methods make Locky ransomware difficult to combat. It has been particularly targeting the healthcare industry in recent months.

Source: www.healthcareitnews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

China-Linked Espionage Groups Target Asian Telecoms

Three Chinese-linked cyber-espionage groups, called Fireant, Neeedleminer, and Firefly by Broadcom’s cybersecurity division Symantec, have targeted telecommunications operators in Asia. Compromising these operators allows the