Jump to content

Locky: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
m citation added
Line 18: Line 18:
==Threat on the rise:==
==Threat on the rise:==


Locky's impact is growing each and ever passing day. According to the report, it is noted that attack caused by locky malware is on the peak.
Locky's impact is growing each and ever passing day. According to the report, it is noted that attack caused by locky malware is on the peak.<ref>{{Cite web
|url = http://www.idigitaltimes.com/new-locky-ransomware-virus-spreading-alarming-rate-can-malware-be-removed-and-files-512956

|title = locky ransomware threats

|accessdate = 26 July 2016

}}</ref>



==References==
==References==

Revision as of 09:52, 26 July 2016

Introduction:

Locky is a ransomware malware. The macros which is a virus program is sent to thousands of computers as an invoice of a company and it uses social media techniques to make user install the ransomeware program in the system.[1] When opened, the files get encrypted, that is, all the file names are converted to a unique 16 letters and digit combination and saves them with .locky extension.[2][3] These files will be as same as the original files. After encryption a display message pops intimation about the ransomware. It states to download tor browser and visit the hackers link for further information. It demands to pay (0.5 to 1.00) bitcoin, where one bitcoin is currently worth about ($400/£280). Since hacker contains the private key, that is, remote servers are controlled by hackers, victims are to pay to remove the ransomware.[4][5]

Threat on the rise:

Locky's impact is growing each and ever passing day. According to the report, it is noted that attack caused by locky malware is on the peak.[6]

References

  1. ^ What is Locky Malware
  2. ^ Locky Malware
  3. ^ "locky ransomware". Retrieved 26 July 2016.
  4. ^ "locky-ransomware-what-you-need-to-know". Retrieved 26 July 2016.
  5. ^ "locky ransomware". Retrieved 26 July 2016.
  6. ^ "locky ransomware threats". Retrieved 26 July 2016.