Home Malware Programs Ransomware LoveLock Ransomware

LoveLock Ransomware

Posted: February 16, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 77
First Seen: February 16, 2017
OS(es) Affected: Windows

The LoveLock Ransomware is a Trojan that encrypts files in specific directories, and, currently, only locks content in a testing folder. Since simple updates to this threat could allow it to block other content, malware experts suggest backing up any important documents, pictures, and other data to an external device. This Trojan uses arbitrary names to disguise its executable, but current anti-malware solutions should identify and delete the LoveLock Ransomware immediately.

A Trojan that Poses Little Peril... for Now

Trojan development cycles aren't always private, and malware researchers sometimes get access to samples with incomplete payloads or even significant bugs. The LoveLock Ransomware is a relatively benign form of a Trojan in progress, but also offers a legible map to its likely conclusion as a live threat to your PC's files. This Trojan employs prototype functions for locking your PC's data and delivering text messages for the purpose of extortion.

Based on the limited sample information available, the LoveLock Ransomware appears to be the work of a native English speaker, although its installer uses names consisting of randomized strings of four characters. If not stopped by appropriate security tools, the LoveLock Ransomware installs itself with a payload consisting of encrypting the 'test2' folder on the Windows desktop. It also gives each file so afflicted a new extension ('.hasp') that malware experts have yet to see in other Trojan campaigns.

Once it locks the contents of that folder, the LoveLock Ransomware creates a 'ReadMe!' Notepad file. Currently, the text is a placeholder 'text1' line with no other information. Most attacks by file-encrypting Trojans drop messages that inform the victim of the attack and request a payment through cryptocurrencies or prepaid cards, often, within a short period. Our malware experts still are analyzing the viability of free file-decoding solutions for the LoveLock Ransomware's payload.

Unlocking the Chains of Love

While the LoveLock Ransomware is an obvious prototype, it does include functional attacks against twenty, commonly-used types of data, including document, Web pages, pictures and spreadsheets. Decrypting the data a Trojan like the LoveLock Ransomware locks can be impractical or fraught with other risks, such as potential data corruption. However, con artists just as often will refuse services after taking their ransoms, which is why malware researchers always recommend that you backup your files.

Detection rates vary between different samples of the LoveLock Ransomware, with under half of most brands of anti-malware tools able to identify it currently. Update your security software on schedule and scan files more likely than usual of being potential infection vectors, such as attachments to e-mail messages. Other than concealing itself, the LoveLock Ransomware doesn't appear to have any remarkable defenses against traditional anti-malware solutions, which, preferably, should delete the LoveLock Ransomware and prevent any loss of your files.

Staying ahead of an organized threat activity is an every-day concern both for malware researchers and anyone who uses a computer or smartphone. One-time infections like the LoveLock Ransomware are more than capable of causing permanent problems, and any readers should be careful about assuming that this Trojan is a prototype that its author will not finish.

Loading...