Skip to main content

Email Attachments Virus Alert

A new variant of ransomware known as Locky (detected by Symantec as Trojan.Cryptolocker.AF) has been spreading quickly since it first appeared on Tuesday (February 16). The attackers behind Locky have pushed the malware aggressively, using massive spam campaigns and compromised websites.

Locky encrypts files on victims’ computers and adds a .locky file extension to them. The ransom demand varies between 0.5 to 1 bitcoin (approximately US$210 to $420).
One of the main routes of infection has been through spam email campaigns, many of which are disguised as invoices. Word documents containing a malicious macro are attached to these emails. Symantec detects these malicious attachments as W97M.Downloader. If this macro is allowed to run, it will install Locky onto the victim’s computer.

Symantec telemetry indicates that Locky was spread by at least five different spam campaigns on February 16. Most of the spam emails seen had a subject line that read “ATTN: Invoice J-[RANDOM NUMBERS]”. Another campaign used “tracking documents” as a subject line.
The spam campaigns spreading Locky are operating on a massive scale. Symantec anti-spam systems blocked more than 5 million emails associated with these campaigns


Comments

Popular posts from this blog

There is no regret in Obedience

It’s a guarantee your life will never be the same again when you obey God. God is our CREATOR and our DIRECTOR meaning he knows the best way for our lives since he loves us, our role is to simply OBEY Him. Obedience is everything when we are relating to God. Obedience is the KEY ingredient in the kingdom of God. God is always ready to manifest himself in our lives when we obey Him and his word(John 14:23 Jesus Replied, “Anyone who loves me will obey my teaching. My Father will love them, and we will come to them and make our home with them.” Like 5:5 Simon Peter an experienced fisherman with a fishing business had toiled the whole night without any catch of fish and he was frustrated and tired and he was washing his nets UNTIL Jesus told him to Launch out into the deep again. Peter had a CHOICE to say YES or NO but he choose to OBEY and he said: “Nevertheless AT THY WORD I WILL LET DOWN THE NET”. The moment he chooses to obey instead of Questioning, Analyzing and trying ...

President Uhuru Kenyatta sets ablaze world's biggest Ivory Pile #WorthMoreAlive #IvoryBurn

Kenya has burned more than Sh31 billion worth of ivory in a bold sign of commitment to declaring a war on ivory trade and poaching. President Uhuru Kenyatta on Saturday lit fire on the 105 tonnes of ivory, stack up in 11 huge pyramid-shaped pyres, that is expected to burn for at least three days. Speaking at the burning ceremony, President Kenyatta said Kenya will not tolerate ivory trade even as the country has to grapple with “a new generation of poachers with sophisticated weapons who are threatening national heritage and safety of communities.” By destroying the ivory, we declare once and for all that our National Heritage is not for sale. For us ivory is worthless, unless it is on our elephants said the president Check the pictures below:>>>>>

CA sounds alert on fake software

The telecommunications sector watchdog has warned companies and individual Internet users from buying fake software, saying it now offers hackers the most common loophole for executing cyber-attacks. The Communications Authority of Kenya (CA), through the National Computer Incident Response Team Co-ordination Centre (National KE-CIRT/CC), warned on Thursday that cybercriminals have changed tack and are now using third-party software to deliver threats to unsuspecting users in an attempt to compromise and steal their personal data. “Though Kenya has not been adversely affected by such attacks as at now, the trend depicts a serious concern in cybercrime management and thus a precaution should be taken when dealing with outsourced products and personnel,” said acting CA director- general Christopher Kemei in a statement. Kenyan businesses lose billions of shillings and troves of sensitive information to hackers every year. SOURCE