Home Malware Programs Ransomware Lockify Ransomware

Lockify Ransomware

Posted: May 5, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 6
First Seen: May 5, 2017
OS(es) Affected: Windows

The Lockify Ransomware is a member of the Hidden Tear family of Trojans with file-encrypting attacks deriving from previously open-source code. Because this family may delete your local backups, external ones can provide more certain recovery options for any users without decryption possibilities on hand. Malware experts also encourage protecting your PC with appropriate anti-malware tools able to remove the Lockify Ransomware or its installers without letting your files be damaged.

Hidden Tear: Less Hidden than Ever Before

Since Hidden Tear persists as a widely available resource for plundering by would-be threat authors, malware experts continue to anticipate new versions of it over the coming weeks and months. Variants like the Mordor Ransomware and the Faizal Ransomware differ little in the immediate effects of their payloads but do show possibly massive differences in how they communicate with their victims, and what they charge to reverse their attacks. The Lockify Ransomware is another sample of just such a Trojan born from this family with no intentions besides locking your files until you pay for them.

The Lockify Ransomware uses still indeterminable means of circulating to new systems, but e-mail spam campaigns are recurring elements of this attack particularly. The small executable uses a variety of misleading filenames, with a slight majority of reputable anti-malware brands identifying it as a threat. The Trojan may drop through document-embedded exploits or other means, such as the currently-popular RIG Exploit Kit.

Most of the details of the Lockify Ransomware's payload show few changes from other forks in the latest branches of the Hidden Tear's family. The Lockify Ransomware scans for files by their formats and directories, afterward encrypting non-essential ones with an AES cipher. The '.Lockify' extension it adds also may help isolate the now-unusable content. The Lockify Ransomware's finishing touch is a pop-up lock-screen that blocks your desktop with an HTML message conveying its ransoming demands and a link to its remote attacker's TOR website.

Don't Lock Yourself out of Data-Saving Options

The Lockify Ransomware's authors are delivering messages that provide inaccurate information on the decryption process for the clear purpose of forcing the victims to pay a ransom without researching any alternatives. PC users with active Lockify Ransomware infections and locked media should remain aware of all potential decryption solutions, along with the fact that using a free decryptor is not 'fatal for your files' necessarily, as the Trojan claims. However, malware experts also argue for backing up all valuable data to keep decryption or the absence of it from becoming an obstacle strenuously.

Threat actors without previous connections or experience in the threat industry can deliver new variants of Hidden Tear without needing any significant programming knowledge. This availability makes Hidden Tear-derived Trojans like the Lockify Ransomware potentially difficult to predict, concerning their distribution exploits particularly. However, most users can defend themselves with a combination of safe Web-browsing behavior, proper password management, and using anti-malware products for catching and deleting the Lockify Ransomware during any install attempts.

Victims shouldn't mistake the terseness and legibility of the Lockify Ransomware's instructions with the brevity of honest communication. Even a ransom-demanding con artist who uses high-tech extortion methods is no better than a stranger snatching your belongings on the street.

Loading...