The blackmailer Locky changes his appearance again and again. A new variant of the Ransomware now encrypts files with the suffix.ODIN, in reference to the Nordic deity. After the infection and the encryption the cybercriminals are largely unchanged: the attackers demand the victim’s ransom before they provide software to decrypt the affected data.
Lesetipp
The new Locky version was discovered by the security experts of Bleeping Computer at the end of September. The antivirus software developer GData has now released a detailed analysis of the .ODIN-Ransomware. According to this, the new Locky variant is only a minor update compared to the previous version, which encrypts files with the suffix.ZEPTO. However, the blackmailer had expanded his evasion strategies against security software and would have increasing numbers of infections.
Lesetipp: The best antivirus programs 2017
Like previous Locky variants, the .ODIN Ransomware spreads via script files sent in e-mail attachments. These can be hidden in Office documents or are available as for example .JS or .WSF file in a ZIP archive. Read in our guide how to avoid a locky infection and make the right settings for Outlook, Word and Co.
No comments:
Post a Comment