LoveLock Ransomware
Posted: February 16, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 77 |
First Seen: | February 16, 2017 |
---|---|
OS(es) Affected: | Windows |
The LoveLock Ransomware is a Trojan that encrypts files in specific directories, and, currently, only locks content in a testing folder. Since simple updates to this threat could allow it to block other content, malware experts suggest backing up any important documents, pictures, and other data to an external device. This Trojan uses arbitrary names to disguise its executable, but current anti-malware solutions should identify and delete the LoveLock Ransomware immediately.
A Trojan that Poses Little Peril... for Now
Trojan development cycles aren't always private, and malware researchers sometimes get access to samples with incomplete payloads or even significant bugs. The LoveLock Ransomware is a relatively benign form of a Trojan in progress, but also offers a legible map to its likely conclusion as a live threat to your PC's files. This Trojan employs prototype functions for locking your PC's data and delivering text messages for the purpose of extortion.
Based on the limited sample information available, the LoveLock Ransomware appears to be the work of a native English speaker, although its installer uses names consisting of randomized strings of four characters. If not stopped by appropriate security tools, the LoveLock Ransomware installs itself with a payload consisting of encrypting the 'test2' folder on the Windows desktop. It also gives each file so afflicted a new extension ('.hasp') that malware experts have yet to see in other Trojan campaigns.
Once it locks the contents of that folder, the LoveLock Ransomware creates a 'ReadMe!' Notepad file. Currently, the text is a placeholder 'text1' line with no other information. Most attacks by file-encrypting Trojans drop messages that inform the victim of the attack and request a payment through cryptocurrencies or prepaid cards, often, within a short period. Our malware experts still are analyzing the viability of free file-decoding solutions for the LoveLock Ransomware's payload.
Unlocking the Chains of Love
While the LoveLock Ransomware is an obvious prototype, it does include functional attacks against twenty, commonly-used types of data, including document, Web pages, pictures and spreadsheets. Decrypting the data a Trojan like the LoveLock Ransomware locks can be impractical or fraught with other risks, such as potential data corruption. However, con artists just as often will refuse services after taking their ransoms, which is why malware researchers always recommend that you backup your files.
Detection rates vary between different samples of the LoveLock Ransomware, with under half of most brands of anti-malware tools able to identify it currently. Update your security software on schedule and scan files more likely than usual of being potential infection vectors, such as attachments to e-mail messages. Other than concealing itself, the LoveLock Ransomware doesn't appear to have any remarkable defenses against traditional anti-malware solutions, which, preferably, should delete the LoveLock Ransomware and prevent any loss of your files.
Staying ahead of an organized threat activity is an every-day concern both for malware researchers and anyone who uses a computer or smartphone. One-time infections like the LoveLock Ransomware are more than capable of causing permanent problems, and any readers should be careful about assuming that this Trojan is a prototype that its author will not finish.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.