Search This Blog

Sunday, October 2, 2016

We’re Up All Night to Get Locky

When we first saw and analyzed Locky back in February, we immediately had a hunch that it was the work of seasoned criminals. The tell-tale signs were strong: massive spam runs were used to spread the ransomware, the malware used domain generation algorithm, the HTTP C2 communication was encrypted (the first version, that is), and the ransomware note was multilingual. The conclusion of our first Locky blog reads:



Fortinet Blog

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.