New Locky Ransomware Phishing Attack: Credit Card Suspended And Suspicious Money Movements

Ransomware is an increasing plague.  We have seen that it can disproportionately impact individuals and small businesses which may be least prepared to protect themselves or respond to ransomware computer attacks.  Yesterday, Graham Cluley described the latest spam email flood trying to hold your computer files ransom for your hard-earned money.
locky

Please be extremely cautious of unsolicited emails, especially with ZIP type attachments.  It’s one of the favorite methods used by cyber-criminals to trick unsuspecting computer users into opening dangerous attachments or clicking on a link to a malicious webpage.

In the last few days there have been a spate of spam attacks duping unwary internet users into clicking on an attachment that will lead to their Windows PC being infected with the notorious Locky ransomware.

For instance, you might have seen messages like the following appearing in your inbox, claiming that there have been “suspicious movements” of funds out of your bank account.

suspicious-movement-email

Attached to the email is a ZIP file containing a malicious .JS (Javascript) file, that if opened downloads a version of the Locky ransomware from a remote server from one of several different URLs, saved in a temporary folder under the name “GyFsMGsLUNA.dll”.

The malware is executed without any requirement for further user interaction. No further clicking is needed.  Some antivirus products detect the malicious Javascript as Trojan.JS.Downloader.GXW.

Similar attacks have been spammed out claiming that your credit card has temporarily been suspended.

account-suspended

Alternatively, you might have received emails posing as notifications that you have a parcel waiting for you at your local mail office.

parcel-email

This final example also leads to the Locky ransomware.

In all cases, the criminals can (and frequently do) change the names and contact details used in the emails meaning that you cannot always rely on them looking the same.  In these examples, the file attachments were all ZIP file attachments.  Criminals frequently use ZIP file attachments to hide the true purpose of the attachment.

Tips to avoid these problems include keeping your operating system up to date, keeping up-to-date security software on your computers and email servers, creating regular off-line backups, and conducting user awareness training to teach employees to be wary of dangerous file types and unsolicited emails.

We know that criminals are making money from online extortion – and ransomware is one of their favorite methods.

If you or your business have questions or concerns regarding fraud, computer law, privacy, or cybersecurity law matters, including assistance with prevention or recovery from a ransomware attack and cybersecurity insurance or insurance claims, contact attorney Jeffrey A. Franklin at Prince Law Offices.

Advertisements

Leave a comment

Filed under Business Law, Communications Law, Computer Law, Consumer Advocacy

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s