A ransomware campaign launched on September 18th, 2017 features a new phishing technique that tricks users into opening what looks like a scanned document from an internal printer. This new phishing technique delivers ransomware that experts at Comodo Threat Research Lab have dubbed “IKARUS”. However, don’t let the new name fool you, IKARUS is the third generation of already wide-spread Locky ransomware. The key is that this variant of Locky works through an email attachment. The hacker will send an email to a user disguised as a printer output which contains a script inside an archived file. This alone may not be enough to register the malicious email as a phishing attempt. In fact, this new delivery channel will bypass some of the defensive/technical controls that businesses currently have in place, making it extremely hard to catch before a user has been exploited.
This story is another example of the ongoing war between offensive and defensive cyber tactics. Defensive techniques for the first two versions of Locky had been developed and dispersed, so a new attack method has been adopted. This is an important thought to keep in mind and re-emphasizes the importance of training employees to have security awareness. A technical control may not recognize that a user did not scan a document from an internal printer, but a user would know that. Therefore, it is important that end users are trained to recognize abnormal activity and respond accordingly.
For more information about the Locky ransomware or to speak with a GraVoc employee about the security of your business, contact us below.
The NSA Cybersecurity Guide for Remote Workers
In this blog post, we cover a few key recommendations for remote workers from the NSA guide, ‘Best Practices for Securing Your Home Network.’
GraVoc Recognized on CRN’s 2023 MSP 500 List
CRN®, a brand of The Channel Company, has named GraVoc to its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2023!
The Cybersecurity Implications of ChatGPT
Is ChatGPT a security risk? In this blog post, we explore the cybersecurity implications of ChatGPT, including the benefits and challenges.