Locky Ransomware new variant with .asasin extension
The latest variant of Locky Ransomware is released. Distributed via spam email containing infected attachments or links to malicious websites.
Once infected, it will scan your PC for .doc, .docx, .xls, .pdf etc files and encrypt them adding an .asasin extension.
After encryption, the Locky will create the Asasin.html, Asasin_[4_digit_number].html, and Asasin.bmp files ransom note in each folder.
Once the user's files are encrypted a ransom note is displayed, instructing the victim to pay a fee, usually in the form of Bitcoin (BTC).
NPAV recommend that all users should be alert of spam emails.
Do not click or download attachments from suspicious or unknown mails. It is very easy for the ransomware to pretend to be a payment invoice or job application or shipping order. Also think twice before installing unverified programs and don't trust illegitimate websites.
Make sure NPAV is installed and update to date. Take regular backup of your important data with NPAV.
- Other (42)
- Ransomware (123)
- Events and News (26)
- Features (44)
- Security (422)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)