Call Us Today! (256) 704-0234 |solutions@techni-core.com
//Quick Update on the Locky Virus

Quick Update on the Locky Virus

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=”]
[av_heading heading=’Quick Update on the Locky Virus’ tag=’h3′ style=’blockquote modern-quote modern-centered’ size=’30’ subheading_active=’subheading_below’ subheading_size=’15’ padding=’25’ color=” custom_font=”]
And what it means for you company’s security.
[/av_heading]

[av_textblock size=’15’ font_color=” color=”]
Remember that nasty Ransomware variant, Locky? Well, we are continuing to receive alerts from the FBI and other agencies about this extremely destructive form of Ransomware. Locky propagates through spam emails to distribute malicious files. These files download and execute code that is capable of encrypting numerous critical file types on both local and networked file stores. Encrypted files are renamed with a unique hexadecimal filename and receive the “.locky” extension.

**Recovery of encrypted files is impossible without data backup or acquisition of the private key due to the well-implemented, strong encryption.**

You can prevent these kinds of sofisticated attacks by taking these simple measures (some, you should already have in place): implement strong spam filters (especially phishing emails); implement technologies like Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) to prevent e-mail spoofing; prohibit personal email in work environments; provide effective user training; implement commercial-grade anti-malware measures; keep offline data backups that are not accessible locally or over the network; manage the use of privileged accounts; implement the principle of least privilege (no users should be assigned administrative access unless absolutely needed); implement Software Restriction Policies (SRP) or other controls to prevent programs from executing from common ransomware locations, like temporary folders that support popular Internet browsers or compression/decompression programs — these include the AppData/LocalAppData folder.

[/av_textblock]
[/av_one_full]

[av_codeblock wrapper_element=” wrapper_element_attributes=”]

[/av_codeblock]

By | 2018-01-05T22:50:38+00:00 July 12th, 2016|Techni-Core Blog|0 Comments

About the Author:

Leave A Comment

Order our newest Book: "Weather the Storm in the Cloud"

Detailing how to move to the cloud and be DFARS 7012 Compliant.  Available on Amazon.com for Kindle!
PURCHASE ON AMAZON NOW
close-link