Discover and read the best of Twitter Threads about #Locky

Most recents (7)

Affaire Alexander Vinnik, épisode 74538. "M. Bitcoin", qui vient de purger sa peine en France (affaire du rançongiciel Locky) vient de se voir signifier en France le mandat d'arrêt émis à son encontre par les Etats-Unis.
Pour rappel, voici le résumé des poursuites américaines contre ce russe
justice.gov/usao-ndca/pr/r…
Ce mercredi 6 juillet, Alexander Vinnik a donc été officiellement informé par un magistrat français de cette demande.
Read 22 tweets
Bonjour,
De retour ce matin à la cour d'appel de Paris pour connaître la décision du tribunal dans l'affaire #Vinnik
Sans préjuger de la décision du tribunal, on voit mal comment les infractions relatives au rancongiciel #Locky pourraient entraîner une condamnation (le ministère public n'avait pas demandé de condamnation sur ce point)
Quant à l'association de malfaiteurs elle n'avait été soutenue que par une seule partie civile
Read 36 tweets
Today's #Locky #spam run uses this trick: image in attached doc has .lnk file that runs a remote script that downloads the #ransomware ImageImage
The malicious document (SHA-1 7b71d259a3168e976e8f3f877e1c948c5111c514) instructs to double-click the image to run the .lnk file Image
The payload is .asasin #Locky #ransomware (SHA-1 7cc63d85fabe99c64f94c6c8089575f566519fc1)
Read 3 tweets
Another massive spam campaign distributes DDE downloader attachment that installs .asasin #Locky #ransomware ImageImage
Attack Surface Reduction (ASR) in Windows Defender Exploit Guard blocks DDE-based malware blogs.technet.microsoft.com/mmpc/2017/10/2…
Microsoft Exchange Online Protection (EOP) and Office 365 Advanced Threat Protection protect customers from malicious emails
Read 4 tweets
Massive #Locky #ransomware #spam campaign uses #Schopets and #Tisar downloaders with file names like "Invoice 916165574 10.18.2017.7z" Image
Attachment is any of various VBScript downloaders in a ZIP inside a 7z archive (ex. 81a4522c15876c6c3ab80139b5061023d0ade5d7)
The payload of this ongoing #spam campaign is an .asasin #Locky variant (0aab2f5bcfe422efa93d0806ff5ee10ac6ee754b)
Read 3 tweets
Latest #Locky variants use .ykcol as file name extension for encrypted files and demand lower ransom ImageImageImage
We’re seeing a massive "Order number" spam campaign distributing .7z attachment with .vbs file that downloads the new .ykcol #Locky variant Image
ykcol Locky SHA-1
0046e4014529f2dddb581e855d1bc0e50ce56355
523d4fe97f74759f5b917bb8ef4982a4011bf8c1
3a2cc64eb0060a0ba7251b723b33441431705d2d
Read 3 tweets
Look who’s back: A fresh #spam campaign is distributing a new variant of #Locky #ransomware ImageImage
Malicious emails sent today August 9, even if Sent date might say July 24, carry .zip with .vbs malware that downloads new #Locky variant Image
New #Locky variant uses file name extension .diablo6 for encrypted files, leaves .htm and .bmp ransom notes, changes wallpaper ImageImage
Read 4 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!