After global attacks that occurred in 2017, there are barely any people left that would not be familiar with a concept of ransomware. These malware infections are probably one of the most severe viruses that we have ever encountered. Of course, some of them are based on Hidden Tear open source projects or are deeply flawed, but every once in a while, sophisticated crypto-viruses enter the arena.
Locky infection is one of the persistent infections that continue to threaten Internet surfers. Victims of this ransomware have no pay of recovering their data, unless they have them in online storages or USB flash drives. Lukitus crypto-virus is generated by the same hackers that are responsible for Locky, and we do think that these ransomware designers are rather persistent.
The newest strategic move that owners of these ransomware infections did was massive. Over the course of 24 hours, crooks were able to send 23 million of malware-laden email letters. It appears that most of them pretended to originate from DropBox service. The notifications required people to verify their emails by clicking on a specific link. What people did not knew was the fact that his seemingly-insignificant click might have allowed a malicious file to be implanted into an operating system.
What else can be said about Lukitus ransomware? Well, Locky was distributed via fraudulent pop-up messages. Who can say that the same strategy won’t be adopted to distribute Lukitus? Victims that become compromised by this disease should notice .lukitus extension at the end of encoded files.
Lastly, we should remind our visitors of a couple of tricks that are designed to help users become immune to ransomware.
1. Upload valuable digital files in backup storages. There is a variety of online services that provide this utility. Find the one that suits your needs and requirements.
2. If the first option is not for you, you could simply place your files in USB flash drive. However, remember no not keep it connected to your operating system. If a ransomware enters, it would encode data in the flash drive as well.
3. Use respectable anti-malware tools. If you will have a proper protection software, ransomware infections (or any other type of malware) will have less chance of slithering inside.