Categories: CryptoNews

Criminals Target Hospitals Through New Locky Ransomware Campaign

A new wave of ransomware attacks against hospital has begun. Internet criminals are distributing Locky ransomware on a vast scale, mostly in the form of phishing campaigns directed at the healthcare sector. The method of distribution is a macro-enabled Office 2007 Word document containing the malicious payload.

Locky Is Making The Rounds Yet Again

A report published by FireEye earlier this week goes to show the majority of targeted hospitals are located in the United States. Other regions include Japan, Korea, and Thailand. By distributing Locky ransomware to these institutions, internet criminals are banking on a big payday. Just last year, the Hollywood Presbyterian Hospital paid US$17,000 to get rid of a ransomware attack.

Previously, criminals would distribute Locky ransomware through spam attacks. With such a myriad of email messages being blasted out, there is a fair chance of success. But when it comes to targeting the healthcare industry, infected macro-enabled Office 2007 Word documents seem to be preferable.

As horrible as it may sound, ransomware distributors have a quote to uphold. Maximising earnings is their top priority, regardless of where the money is coming from. Despite this change of distribution tactics, the Locky ransomware is still downloaded from a centralised server. If security researchers can figure out these server locations, they may be able to shut down this threat once again.



Related Post

It has to be said, however, that distributors of this new wave of Locky ransomware are taking a far more professional approach. Every email campaign has a unique ID which is broadcasted when the payload is downloaded. This allows distributors to keep track of successful distribution attempts.

The healthcare industry is not the only sector of value to Locky distributors right now. Several campaigns are targeting transportation, telecom and manufacturers all over the world. So far, no mention was made of any enterprises paying the ransom demand in Bitcoin.We can only hope things stay that way for the foreseeable future.

Image credit 1

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

11 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

1 day ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

1 day ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

2 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

3 days ago

Polygon Raises Network Capacity To 140M Gas

Polygon has made a big move in cementing its mission as one of the leading…

4 days ago