A persistent threat, Locky ransomware apparently has no plans to disappear anytime soon. Locky recently changed to utilize one of the most popular methods of spreading malware: spear phishing emails. In this blog post, a VBS file archived via zip is dissected showing the techniques used by threat actors to avoid detection.
This is a Security Bloggers Network syndicated blog post authored by Cylance Blog. Read the original post at: Cylance Blog