A persistent threat, Locky ransomware apparently has no plans to disappear anytime soon. Locky recently changed to utilize one of the most popular methods of spreading malware: spear phishing emails. In this blog post, a VBS file archived via zip is dissected showing the techniques used by threat actors to avoid detection.
*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by Cylance Blog. Read the original post at: https://www.cylance.com/en_us/blog/threat-spotlight-locky-ransomware.html