New Locky Ransomware – FAQs and How You MUST Act Now


We understand that your focus is to drive business growth and stay ahead of the competition. That’s why our Expertly Managed IT services are curated to streamline your operations, help secure your business, and ensure your technology scales with your ambition. We bring a proactive approach to IT management, offering tailored solutions that keep you connected and protected. With services ranging from real-time monitoring to cutting-edge cybersecurity and disaster recovery planning, we’re here to empower your strategic decisions with our Virtual CIO and co-managed IT support. We stand by a security-first ethos, reinforced by our dedicated helpdesk, ensuring clear assistance in plain English, anytime you need it. We are your partner in building a resilient, efficient, and innovative IT infrastructure, freeing you to focus on what you do best: running your business.

Empower Your Business with Expert IT Support

Unlock efficiency and secure your digital assets with our Expertly Managed IT services—where peace of mind meets innovation.

Have you opened any invoice attachments lately? Now, there’s a new ransomware called Locky Ransomware that’s joined the ranks of viruses like CryptoLocker and CryptoWall. This latest malware threat was detected just last week and already, it’s spread at an alarming rate, employing sophisticated social engineering tactics and bypassing antivirus (AV), spam filtering and web filtering solutions. According to Dark Reading, Kevin Beaumont, one of the first security researchers to unearth Locky, revealed he had seen “around 4,000 new infections per hour, or roughly 100,000 per day.”

What is Locky?

Locky is the latest strain of ransomware that uses two forms of social engineering to encrypt files, filenames and unmapped network shares.

How is Locky Installed?

Like its ransomware predecessors, Locky relies on email phishing to successfully install. So far, experts report that hackers email victims a fake invoice, hoping they’ll download the malicious attachment. Bleeping Computer has already warned readers to watch out for emails with subjects similar to ATTN: Invoice J-98223146. As we know, hackers use social engineering to convince targets they’re trustworthy by appearing legitimate when communicating online or over the phone. For now, Locky can’t be successfully launched without getting the victim to comply. After examining the sophistication of the text in the body of the Locky email, it’s easy to see how attackers are able to gain buy-in. See the following screenshot of the email message taken from Lawrence Abrams’s incredibly helpful article:

image source:


What Happens When Locky is Installed?

Once installed,, Locky encrypts your data and changes filenames to be indecipherable. It’s worth noting that a wide array of file extensions are compromised in the process, including videos, images, documents and source code. Not only that, but as a Naked Security by Sophos article explains, Locky “scrambles any files in any directory on any mounted drive that it can access, including removable drives that are plugged in at the time, or network shares that are accessible, including servers and other people’s computers, whether they are running Windows, OS X or Linux.” 

Locky wouldn’t be classified as ransomware if it didn’t demand some form of Bitcoin payment to decrypt the affected files. Once infected, victims’ desktop wallpapers are changed, displaying the following ransom payment process instructions:

image source:


What Preventative Steps Must You Take?

1. Make sure your system has the right Antivirus and Antimalware software installed for endpoint security so that they can catch Locky and other ransomware early.

2. Monitor your systems for suspicious behavior such as pop-ups or an abnormal rate of file changes.

3. Update your systems with critical vendor releases and patches regularly. While this may not directly stop Locky, it’s a best practice for malware prevention in general because it corrects vulnerabilities in desktop applications that hackers can exploit.

4. Implement a proper firewall to protect your network at the gateway level and block harmful files from reaching your network.

5. Make sure your IT company knows how to deal with ransomware and related items, and is taking the proper precautions to protect you.

6. Most importantly, leverage the right backup and disaster recovery (BDR) solution and back up regularly.

What Role Does Backup Play in Locky Risk Mitigation?

This last preventative step is a point we can’t emphasize enough! The only way to get corrupted data back without paying the ransom, which ranges from at least 0.5 to 2 Bitcoins ($208 to $800), is through your most recent backup. If you don’t already recognize the absolute necessity of backup to protect and restore client data from all instances of data breaches and data loss, consider the fact that Locky deletes any existing Volume Snapshot Service (VSS) files and encrypts network-based backup files. Evade this trap, and choose a business grade BDR solution that lets you efficiently back up encrypted data offsite to a secure, trusted public cloud. It’s your only failsafe when ransomware like Locky strikes. 

What If I’m Not Protected or Not Sure About My IT’s Abilities?

Contact our team to schedule your Free No Obligation Network Assessment and to learn more about how we protect our clients on a daily basis, and how you can also be provided with IT peace of mind and take yur IT to the next level.




Article Source:

  • Get exclusive access to expert insights and tips for leveraging technology to grow your business.
  • Stay up to date on the latest tech trends and advancements that can help you stay ahead of the competition.
  • Join a network of business leaders who are committed to using technology to drive success and innovation.
  • Receive personalized support and guidance from our team of IT experts.
  • Enjoy a more streamlined and secure digital experience with our insider tips and tricks.

Don’t miss out on all the benefits – subscribe now and take your business to the next level!

black and white laptop computer

7 Helpful Features Rolled Out in the Fall Windows 11 Update

In a world where technology constantly evolves, Microsoft stands at the forefront. It continues to pioneer innovations. Innovations that transform how we interact with our digital universe.The fall Windows 11 update is a testament to Microsoft’s commitment to excellence. It’s…
Free cybersecurity data security firewall illustration

Why You Need to Understand “Secure by Design” Cybersecurity Practices

Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re a large enterprise or small business, network security is a must. Cyberattacks can have long-term consequences.The frequency and sophistication of cyberattacks continue to increase. In…
white laptop computer on white table

What Is Microsoft Sales Copilot & What Does It Do?

The use of AI-driven processes is exploding. Every time you turn around, software has gotten more intelligent. Harnessing the power of AI and machine learning is crucial for staying competitive.Microsoft is a pioneer in the tech industry and this new…
Free Turned on Silver Imac With Might Mouse and Keyboard Stock Photo

These 18 Sustainable Tech Habits Are a Win for Your Bottom Line

In today’s world, sustainability isn’t just a buzzword; it’s a necessity. Businesses around the globe are increasingly embracing eco-friendly practices. This isn’t only for the positive impact on the environment. It’s also for the benefits they can bring to the…