breaking news

Locky ransomware: payment

March 21st, 2017 | by BTC News
Locky ransomware: payment
Tech
0

A few nice bitcoin scams images I found:

Locky ransomware: payment
bitcoin scams
Image by Christiaan Colen
Example of Locky ransomware.

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

After encryption, a message (displayed on the user’s desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

Read more: en.wikipedia.org/wiki/Locky

Locky ransomware: payment
bitcoin scams
Image by Christiaan Colen
Example of Locky ransomware.

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

After encryption, a message (displayed on the user’s desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

Read more: en.wikipedia.org/wiki/Locky

Locky ransomware: payment
bitcoin scams
Image by Christiaan Colen
Example of Locky ransomware.

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

After encryption, a message (displayed on the user’s desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

Read more: en.wikipedia.org/wiki/Locky

Leave a Reply

Your email address will not be published. Required fields are marked *