{"id":22041,"date":"2017-08-17T12:16:56","date_gmt":"2017-08-17T18:16:56","guid":{"rendered":"https://www.webroot.com/blog/?p=22041"},"modified":"2019-03-25T17:02:51","modified_gmt":"2019-03-25T23:02:51","slug":"locky-ransomware-resurges-diablo-lukitus","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/08\/17\/locky-ransomware-resurges-diablo-lukitus\/","title":{"rendered":"Locky ransomware rises from the crypt with new Lukitus and Diablo variants"},"content":{"rendered":"<p><strong>NOTE:<\/strong><em> This blog post discusses active research by Webroot into an emerging threat. This information should be considered preliminary and will be updated as more data comes in.<\/em><\/p>\n<p>New variants of Locky\u2014Diablo and Lukitus\u2014have surfaced from the ransomware family presumed by many to be dead. After rising to infamy as one of the first major forms of ransomware to achieve global success, Locky\u2019s presence eventually faded. However, it appears this notorious attack is back with distribution through the Necurs botnet, one of the largest botnets in use today.<\/p>\n<h2><strong>Webroot protects against Diablo and Lukitus<\/strong><\/h2>\n<p>We first detected Diablo on August 9, 2017, and Lukitus yesterday, August 16. Since then, we\u2019ve seen activity hitting Windows XP, Windows 7, and Windows 10 machines in the United States, United Kingdom, Italy, Sweden, China, Botswana, Russia, Netherlands, and Latvia.<\/p>\n<h2>How are these attacks deployed?<\/h2>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-22045 alignnone\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky1.png\" alt=\"\" width=\"709\" height=\"312\"><\/p>\n<p>&nbsp;<\/p>\n<p>As with previous versions, the initial attack vector is through malspam campaigns in which phishing emails contain a zipped attachment with malicious javascript that downloads the Locky payload.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-22047 alignnone\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky2.png\" alt=\"\" width=\"877\" height=\"397\"><\/p>\n<p>&nbsp;<\/p>\n<p>Once the Locky payload is dowloaded, it encrypts the users\u2019 files with \u201c.diablo6\u201d and \u201c.Lukitus\u201d, respectively.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-22049 alignnone\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky3.png\" alt=\"\" width=\"920\" height=\"309\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky3.png 1051w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky3-768x257.png 768w\" sizes=\"(max-width: 920px) 100vw, 920px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Then it changes the desktop background and provides the rescue pages \u201cdiablo6.htm\u201d and \u201clukitus.htm\u201d, which are identical.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-22051 alignnone\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky4.png\" alt=\"\" width=\"653\" height=\"357\"><\/p>\n<p>&nbsp;<\/p>\n<p>Following what\u2019s been standard for years, the Locky ransomware instructs the user to install a Tor Browser, then navigate to your unique .onion address to pay the ransom.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-22053 alignnone\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky5.png\" alt=\"\" width=\"779\" height=\"770\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky5.png 987w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/08\/locky5-768x759.png 768w\" sizes=\"(max-width: 779px) 100vw, 779px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>There is currently no available decryption tool that will work, other than paying the ransom to obtain the decryption keys. Although Webroot will stop this specific variant of Ransomware as a Service in real time\u2014before any encryption takes place\u2014don\u2019t forget that the best protection in your anti-ransomware arsenal is a strong secure backup. You can use a cloud service or offline external storage, but remember to keep it up to date for personal productivity and business continuity.<\/p>\n<p>For best practices for securing your environment against encrypting ransomware, see our <a href=\"https:\/\/community.webroot.com\/t5\/Announcements\/New-guide-to-avoiding-crypto-ransomware\/td-p\/248050\">community post<\/a>.<\/p>\n<h3>Initial list of MD5s analyzed by Webroot<\/h3>\n<p><strong>NOTE:<\/strong><em>&nbsp;This exhaustive list is current as of publication of this blog. We will continue to update internal lists but will not publish further additions until such time that we deem it necessary.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>2E1A3A5F24AA6D725405E009949E6F0B<\/p>\n<p>7821C8F49773EC65B9DFE8921693B130<\/p>\n<p>544BC1C6ECD95D89D96B5E75C3121FEA<\/p>\n<p>A2AEC1429D045355098355CAA371F23E<\/p>\n<p>4779E473C909104272853EA1313BEE37<\/p>\n<p>D7D22FFB1E746C20828422DA5CDF93DA<\/p>\n<p>5245A7FA2351212EBF8257C55536791D<\/p>\n<p>FE1CBC72C53AE7D8D16A5C943B5769FC<\/p>\n<p>EA1832B7539BE8F265C08C0075CCB4DE<\/p>\n<p>ACEA79268714A4752E3BF22161B90471<\/p>\n<p>4BAA57A08C90B78D16C634C22385A748<\/p>\n<p>0816080383AB3F33FEB9B6B51E854C73<\/p>\n<p>0E05A7B9F1F2A19B678D2D92ABF70E47<\/p>\n<p>F83DDED266CA056804BCC60EB998FA6C<\/p>\n<p>4938F1D87F52473BC13C88498D6FC7AF<\/p>\n<p>4BAA57A08C90B78D16C634C22385A748<\/p>\n<p>F83DDED266CA056804BCC60EB998FA6C<\/p>\n<p>8009E4433AAD21916A7761D374EE2BE9<\/p>\n<p>E7E5628F67CB2FA99A829C5A044226A4<\/p>\n<p>4BAA57A08C90B78D16C634C22385A748<\/p>\n<p>3506AB24DB711CF76F95F89B4990981A<\/p>\n<p>ECDAFEF0E38D2B5F24B806AF4FD54CC6<\/p>\n<p>89ED8780CAE257293F610817D6BF1A2E<\/p>\n<p>E613CF78955A4C1D8732B0ECB202CAEC<\/p>\n<p>45021A1A159DEA9952AD3494B8D49852<\/p>\n<p>993608B9AEA2B351E4BA883FEE8916B0<\/p>\n<p>FBE9106026AF42CD24AB970ED718A579<\/p>\n<p>23CCA546A85B5CAA12441F7F4C6B48E4<\/p>\n<p>01DA2F592A64F2ABA0986319436177A5<\/p>\n<p>96E214BAF7F26B879BAF0D87D830F916<\/p>\n<p>040C537F575ED64374AB7F38F27E03F1<\/p>\n<p>D3C856485116A09CAA37D867561BD634<\/p>\n<p>BA82AA75BF6FC2549049877ACE505A24<\/p>\n<p>9C6F2921CE536393198C605C15AE8C91<\/p>\n<p>941CDFF8A86E56D11FCAF25CF7C2129B<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NOTE: This blog post discusses active research by Webroot into an emerging threat. This information should be considered preliminary and will be updated as more data comes in. New variants of Locky\u2014Diablo and Lukitus\u2014have surfaced from the ransomware family presumed by many to be dead. After rising to infamy as one of the first major [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":22055,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[21283,3563,21285,4321,18645,21281,21117,4401,6329,6325,6327,9645,8205,13969,5423,3937,3947,9639,3525,3951],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22041"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=22041"}],"version-history":[{"count":14,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22041\/revisions"}],"predecessor-version":[{"id":27621,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22041\/revisions\/27621"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/22055"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=22041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=22041"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=22041"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=22041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}