New Locky Ransomware – FAQs and How You MUST Act Now

WELCOME TO SOLUTIONS SQUAD!

We understand that your focus is to drive business growth and stay ahead of the competition. That’s why our Expertly Managed IT services are curated to streamline your operations, help secure your business, and ensure your technology scales with your ambition. We bring a proactive approach to IT management, offering tailored solutions that keep you connected and protected. With services ranging from real-time monitoring to cutting-edge cybersecurity and disaster recovery planning, we’re here to empower your strategic decisions with our Virtual CIO and co-managed IT support. We stand by a security-first ethos, reinforced by our dedicated helpdesk, ensuring clear assistance in plain English, anytime you need it. We are your partner in building a resilient, efficient, and innovative IT infrastructure, freeing you to focus on what you do best: running your business.

Empower Your Business with Expert IT Support

Unlock efficiency and secure your digital assets with our Expertly Managed IT services—where peace of mind meets innovation.

Have you opened any invoice attachments lately? Now, there’s a new ransomware called Locky Ransomware that’s joined the ranks of viruses like CryptoLocker and CryptoWall. This latest malware threat was detected just last week and already, it’s spread at an alarming rate, employing sophisticated social engineering tactics and bypassing antivirus (AV), spam filtering and web filtering solutions. According to Dark Reading, Kevin Beaumont, one of the first security researchers to unearth Locky, revealed he had seen “around 4,000 new infections per hour, or roughly 100,000 per day.”

What is Locky?

Locky is the latest strain of ransomware that uses two forms of social engineering to encrypt files, filenames and unmapped network shares.

How is Locky Installed?

Like its ransomware predecessors, Locky relies on email phishing to successfully install. So far, experts report that hackers email victims a fake invoice, hoping they’ll download the malicious attachment. Bleeping Computer has already warned readers to watch out for emails with subjects similar to ATTN: Invoice J-98223146. As we know, hackers use social engineering to convince targets they’re trustworthy by appearing legitimate when communicating online or over the phone. For now, Locky can’t be successfully launched without getting the victim to comply. After examining the sophistication of the text in the body of the Locky email, it’s easy to see how attackers are able to gain buy-in. See the following screenshot of the email message taken from Lawrence Abrams’s incredibly helpful article:

image source: http://www.bleepingcomputer.com/news/security/the-locky-ransomware-encrypts-local-files-and-unmapped-network-shares/

 

What Happens When Locky is Installed?

Once installed,, Locky encrypts your data and changes filenames to be indecipherable. It’s worth noting that a wide array of file extensions are compromised in the process, including videos, images, documents and source code. Not only that, but as a Naked Security by Sophos article explains, Locky “scrambles any files in any directory on any mounted drive that it can access, including removable drives that are plugged in at the time, or network shares that are accessible, including servers and other people’s computers, whether they are running Windows, OS X or Linux.

Locky wouldn’t be classified as ransomware if it didn’t demand some form of Bitcoin payment to decrypt the affected files. Once infected, victims’ desktop wallpapers are changed, displaying the following ransom payment process instructions:

image source: https://nakedsecurity.sophos.com/2016/02/17/locky-ransomware-what-you-need-to-know/

 

What Preventative Steps Must You Take?

1. Make sure your system has the right Antivirus and Antimalware software installed for endpoint security so that they can catch Locky and other ransomware early.

2. Monitor your systems for suspicious behavior such as pop-ups or an abnormal rate of file changes.

3. Update your systems with critical vendor releases and patches regularly. While this may not directly stop Locky, it’s a best practice for malware prevention in general because it corrects vulnerabilities in desktop applications that hackers can exploit.

4. Implement a proper firewall to protect your network at the gateway level and block harmful files from reaching your network.

5. Make sure your IT company knows how to deal with ransomware and related items, and is taking the proper precautions to protect you.

6. Most importantly, leverage the right backup and disaster recovery (BDR) solution and back up regularly.

What Role Does Backup Play in Locky Risk Mitigation?

This last preventative step is a point we can’t emphasize enough! The only way to get corrupted data back without paying the ransom, which ranges from at least 0.5 to 2 Bitcoins ($208 to $800), is through your most recent backup. If you don’t already recognize the absolute necessity of backup to protect and restore client data from all instances of data breaches and data loss, consider the fact that Locky deletes any existing Volume Snapshot Service (VSS) files and encrypts network-based backup files. Evade this trap, and choose a business grade BDR solution that lets you efficiently back up encrypted data offsite to a secure, trusted public cloud. It’s your only failsafe when ransomware like Locky strikes. 

What If I’m Not Protected or Not Sure About My IT’s Abilities?

Contact our team to schedule your Free No Obligation Network Assessment and to learn more about how we protect our clients on a daily basis, and how you can also be provided with IT peace of mind and take your IT to the next level.

 

 

 

Article Source: http://bit.ly/1RWmZqo

Don’t miss out on all the benefits – subscribe now and take your business to the next level!

  • Get exclusive access to expert insights and tips for leveraging technology to grow your business.
  • Stay up to date on the latest tech trends and advancements that can help you stay ahead of the competition.
  • Join a network of business leaders who are committed to using technology to drive success and innovation.
  • Receive personalized support and guidance from our team of IT experts.
  • Enjoy a more streamlined and secure digital experience with our insider tips and tricks.
it help and support davie, fl managed it services

IT Help and Support in Davie, Florida

IT Help and Support in Davie, Florida Have you ever wondered how your business can stay ahead in the tech-driven world without breaking a sweat? Imagine having a partner right in your corner, focused on ensuring your technology operates as…
Free A typewriter with the word deepfake on it Stock Photo

Beware of Deepfakes! Learn How to Spot the Different Types

Have you ever seen a video of your favorite celebrity saying something outrageous? Then later, you find out it was completely fabricated? Or perhaps you’ve received an urgent email seemingly from your boss. But something felt off.Welcome to the world…
empowering hialeah small businesses with it helpdesk services

Empowering Hialeah Small Businesses with IT Helpdesk Services

Hey there, Hialeah entrepreneurs! Are you tired of tech troubles slowing down your business? It’s time to consider a small business IT helpdesk. Let’s explore why this could be a game-changer for your company. Empowering Hialeah Small Businesses with IT…
Free smart home house technology vector

10 Most Common Smart Home Issues (and How to Fix Them)

Back when you were a kid, living in a “smart home” probably sounded futuristic. Something out of Back to the Future II or The Jetsons. Well, we don’t yet have flying cars, but we do have video telephones as well…
network security your digital shield in coral gables

Network Security: Your Digital Shield in Coral Gables

Hey there, Coral Gables business owners! In today’s digital landscape, the security of your network is more crucial than ever. Let’s dive into the importance of network security and how a Managed IT Services provider like Solutions Squad can be…
closeup photo of turned-on blue and white laptop computer

What Is Microsoft Security Copilot? Should You Use It?

It can be challenging to keep up with the ever-evolving cyber threat landscape. Companies need to process large amounts of data. As well as respond to incidents quickly and effectively. Managing an organization’s security posture is complex.That’s where Microsoft Security…