A new ransomware “super bug”, codenamed “Locky”, is on the lose. There have been 500 000 sessions of the virus crossing the globe in the last few weeks – and now it has arrived in South Africa.
Anti-virus coverage for this type of malware is very poor – only four out of 54 service providers detected it.
It is believed that there are 4 000 infections an hour now – 100 000 infections a day.
A hospital group in the US has had to shut its doors after the fee to purchase its own files was set at $3,6-million – to be paid in untraceable Bitcoin.
There are 499 000 other cases of Locky reported so far. The virus is spread via infected Word documents.
A click on the attachment and the unfortunate victims, unable to mitigate this threat, are given a ransom demand for their files.
And a subsequent visit to the referenced Locky payment portal site reveal multiple options for victims to pay – including payment plans.
How to stay Locky-free:
• Never download freeware or files from untrusted sources as it might be infected.
• Always scan removable devices before using them.
• Regularly scan your PC to detect .locky File Extension Ransomware as well as other related threats.
• Always keep Windows Operating System updated.
• Browser’s security settings should be activated and set to medium level.
• Avoid installation of ActiveX controls as it is somewhat prone to .locky File Extension Ransomware.
• Never install potentially unwanted program on your PC.
• Always carefully read “License and Agreement” before installing any freeware.
• Turn on firewall and other security settings for better PC protection.
• Do not click on suspicious links while surfing web.
• Avoid getting carried away by unrealistic deals and offers as it can be a trick used by .locky File Extension Ransomware.
• Never respond to unknown mails and messages.