Locky Ransomware switches to the Lukitus extension for Encrypted Files
Jump to navigation
Jump to search
(Publication) Google search: [1]
Locky Ransomware switches to the Lukitus extension for Encrypted Files | |
---|---|
Botnet | Locky, Lukitus |
Malware | |
Botnet/malware group | Cryptolocker |
Exploit kits | |
Services | |
Feature | .lukitus |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2017 / 2017-08-16 |
Editor/Conference | Bleeping Computer |
Link | https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-lukitus-extension-for-encrypted-files/ (Archive copy) |
Author | Lawrence Abrams |
Type | Blogpost |
Abstract
“ Today a new Locky Ransomware variant was discovered by Rommel Joven that switches to the .lukitus extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Lukitus Ransomware, as some sites may call it. You are instead infected by Locky, which is using the .lukitus extension. There is a difference.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2017BFR5335, editor = {Bleeping Computer}, author = {Lawrence Abrams}, title = {Locky Ransomware switches to the Lukitus extension for Encrypted Files}, date = {16}, month = Aug, year = {2017}, howpublished = {\url{https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-lukitus-extension-for-encrypted-files/}}, }