Categories: CryptoNews

Criminals Target Hospitals Through New Locky Ransomware Campaign

A new wave of ransomware attacks against hospital has begun. Internet criminals are distributing Locky ransomware on a vast scale, mostly in the form of phishing campaigns directed at the healthcare sector. The method of distribution is a macro-enabled Office 2007 Word document containing the malicious payload.

Locky Is Making The Rounds Yet Again

A report published by FireEye earlier this week goes to show the majority of targeted hospitals are located in the United States. Other regions include Japan, Korea, and Thailand. By distributing Locky ransomware to these institutions, internet criminals are banking on a big payday. Just last year, the Hollywood Presbyterian Hospital paid US$17,000 to get rid of a ransomware attack.

Previously, criminals would distribute Locky ransomware through spam attacks. With such a myriad of email messages being blasted out, there is a fair chance of success. But when it comes to targeting the healthcare industry, infected macro-enabled Office 2007 Word documents seem to be preferable.

As horrible as it may sound, ransomware distributors have a quote to uphold. Maximising earnings is their top priority, regardless of where the money is coming from. Despite this change of distribution tactics, the Locky ransomware is still downloaded from a centralised server. If security researchers can figure out these server locations, they may be able to shut down this threat once again.



Related Post

It has to be said, however, that distributors of this new wave of Locky ransomware are taking a far more professional approach. Every email campaign has a unique ID which is broadcasted when the payload is downloaded. This allows distributors to keep track of successful distribution attempts.

The healthcare industry is not the only sector of value to Locky distributors right now. Several campaigns are targeting transportation, telecom and manufacturers all over the world. So far, no mention was made of any enterprises paying the ransom demand in Bitcoin.We can only hope things stay that way for the foreseeable future.

Image credit 1

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

TRON Leads All Blockchains in November Fees as Perpetuals Trading Surges 271%

TRON ended November as the top blockchain by fees, extending its dominance in payment infrastructure…

1 day ago

Prediction Markets Hit New All-Time Highs as November Volume Surges to $14.3B

Prediction markets just locked in another breakout month. November closed with $14.3 billion in total…

1 day ago

Trust Wallet Launches Native Predictions: A New Era for On-Chain Betting

Trust Wallet is stepping into a completely new lane. The CZ-owned self-custody wallet has launched…

2 days ago

Kraken Acquires Backed to Supercharge Tokenized Equities as xStocks Enters Its Next Phase

Kraken has announced the acquisition of Backed, the tokenization platform behind some of the fastest-growing…

2 days ago

Sui Pauses & AVAX Rebounds While Zero Knowledge Proof’s 200M Daily Presale Auction Goes Live, Sparking Massive Buyer Rush

Sui Pauses & AVAX Rebounds While Zero Knowledge Proof’s 200M Daily Presale Auction Goes Live,…

3 days ago

Europe Takes Down Cryptomixer: A $1.4B Bitcoin Laundering Machine Falls After Eight Years

Europe just shut down one of crypto’s longest-running shadows. Germany and Switzerland, backed by Europol,…

3 days ago