Home Malware Programs Ransomware Lock2017 Ransomware

Lock2017 Ransomware

Posted: March 6, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 283
First Seen: March 6, 2017
Last Seen: January 24, 2021
OS(es) Affected: Windows

The Lock2017 Ransomware is a Trojan that extorts money from its victims after locking their files with a ciphering routine. The evidence that malware experts can gather indicates that this threat may be a part of the Crysis Ransomware family, which uses potentially unbreakable file-locking techniques. Backing up your files and having anti-malware products for eliminating the Lock2017 Ransomware upon its detection are the two critical defensive measures against this threat.

A 2017 Example of How Con Artists may Turn Cyber Attacks into Money

With new variants of old Trojans often being made from application-generating utilities easily, after paying a modest fee, malware researchers see more updates than ever of old threats. Identification isn't always clear-cut, however, and con artists often name the components of their Trojans misleadingly or include incorrect baseline messages, both of which are visible with the Lock2017 Ransomware. The Lock2017 Ransomware campaign is newly-detected with still unknown infection methods, although a majority of file-encrypting Trojans use e-mail spam as a favorite installation exploit.

The key features of the Lock2017 Ransomware include:

  • The Lock2017 Ransomware scans your hard drives for documents and other files of formats in its configured whitelist. The Lock2017 Ransomware encrypts this content with an AES-based cipher to block other programs from opening them and protects the generated key with another level of the RSA-based encryption.
  • The Lock2017 Ransomware modifies the filenames with an appended extension that includes a customized identification number and one of two e-mail addresses for contacting its threat actors.
  • In spite of using the distinctive, filename-editing pattern of the Crysis Ransomware, the Lock2017 Ransomware also drops a 'readme.txt' file similar to other families of file-encoding Trojans. This text includes many of the elements common to similar campaigns, such as demands for Bitcoin ransoms to decrypt your content, offers of a 'free sample' decryption, a time limit, and a fake description of the level of the RSA encryption.

Starting Off 2017 with Effective File Protection

The Lock2017 Ransomware campaign is one of many attacks emerging from threats of the same classification, specializing in holding the data you save on your drive hostage. Backups, especially non-local ones, are almost universally the most guaranteed security strategy for keeping Trojans from locking or otherwise damaging your files indefinitely. The Lock2017 Ransomware does not have a free decryption utility available, and, as malware experts are noting similarities with unbreakable file-encryption Trojans, such a solution may never emerge.

Fake memos, invoices, and other e-mail attachment-based forgeries are probable installation methods for threats of the Lock2017 Ransomware's category. Use anti-malware products to scan and detect these harmful attachments as threatening to your PC before they install their payloads. Preventing encryption in the first place, instead of deleting the Lock2017 Ransomware after it finishes its attacks, may be the only viable strategy for protecting the contents of your local hard drives.

Sufficiently off-guard victims may be liable to consider paying the cryptocurrency ransom the Lock2017 Ransomware's authors solicit. However, as malware experts often verify in different Trojan attacks, paying con artists to undo the damage they've already caused is a solution that stands on shaky ground.

Loading...