Security

No cases of Locky Ransomware attack so far, still India needs to be vigil

Security

In the wake of Locky Ransomware attack and the Government of India issuing alert across the country, Trend Micro, states that there is no incidence has been reported in India at present.

As per Trend Micro, the ransomware is not likely to be on the scale of Wannacry and Petya ransomware, which relies on Microsoft vulnerability in Windows XP. Trend Micro has also provided precautionary measures on how to stop the Lukitus variant of Locky ransomware from spreading.

“So far, there haven’t been any cases of Locky ransomware reported in India or across geographies …”
Sharda Tickoo

Sharda Tickoo, Technical Head, Trend Micro India, says, “So far, there haven’t been any cases of Locky ransomware reported in India or across geographies, but we are getting inquiries from customers and Trend Micro’s support team is helping out in resolving them. For addressing this malware, Trend Micro has its protection in place with suspicious and bad URLs being blocked. There are technologies wherein such embedded macros and file scripts can be detected and deleted.”

Pointing out the differences between other ransomware, she adds, “Wannacry and Petya ransomware looks for Microsoft vulnerability to exploit and spread. There were only a few machines with Microsoft vulnerability in Windows XP and hence the damage was huge. In this case, it is not exploiting any vulnerability, but what it uses is a Visual Basic (VB) / JavaScript encrypts in a document and the chances of this malware getting evaded are high.”

Dos and Don’ts

On the dos and don’ts, she further adds, “Since this particular malware arrives through email compressed attachment and through hidden Visual Basic (VB) / JavaScript, we have to ensure that email as a channel is widely protected. We are trying to build a ransomware strategy with two best practices – first is to start with fortifying email defense mechanisms and second is to delete the VB or Java Script if it is not used in machines. There are certain secure configurations which are unnecessary and not running, should be blocked. This particular malware has a tendency of self-deletion. It deletes itself with no traces left, once the payload is executed. It encrypts local drives and network shares. The basic hygiene is to try and avoid open network share and to make sure it is password protected.”

Most Popular

The Red Mark has been established as a news portal to act as a conduit between the booming startup economy and the established, traditional players. Today's startups are tomorrow's small and medium business or large enterprise and we believe that no one can afford to be an island; if both work in tandem they can learn a lot from each other.

Contact Us

Address : 570, first floor, sector 22B , Gurgaon - 122015

Contact No. : 0124-4377494

For Any Query Please write below


Editorial : karma@theredmark.net

Advertisement : hem@theredmark.net

Subscribe to Our Newsletter





CAPTCHA


copy the digits from the image into this box

Copyright © 2016-2017 The Red Mark. All Rights Reserved.

To Top