The Locky Ransomware is Reapearing with the .AESIR Extension

Security analysts have discovered that the Locky ransomware may be reappearing with the AESIR extension.

Locky Rises To The Aesir

Computer security analysts have spotted a new malware threat that is believed to be a new iteration of the dangerous Locky ransomware family. The first detection of the new virus has been announced today.

There is still limited information about the new update however here are some of the known key changes to the Locky code:

  • There is a new command and control remote malicious server URL
  • The POST command is changed to point to the /information.cgi location
  • The compromised files are renamed using the .AESIR extension

Some other reports indicate that other Locky might infect computer owners, encrypt their files and append the .pikachu extension. This is probably another Locky or Locky-related virus threat.

The analysts have run the available virus samples through several heuristic scans and the virus is already being added by various anti-virus and anti-spyware vendors to the daily updated definition sets. As the Locky origins are not yet confirmed generic names are appended to the threat. Some of the names are the following:

  • W32.eHeur.Malware09
  • malicious_confidence_95% (D)
  • trojandownloader.win32.silcon.a
  • HEUR/QVM39.1.0000.Malware.Gen
  • [email protected] (thunder)
  • Win32.Trojan.Raasj.Auto

Some of our readers might question why the virus has changes the extension. Major changes in the big ransomware families occur with new naming schemes. Locky is a reference to Loki, the Norse Trickster God and Aesir is one of the two main groups of Deities in the Norse Pantheon. The other one is the Vanir which is probably going to be used in later iterations of the ransomware threats.
We are going to update you when we receive more information about the new virus instances.

Was this content helpful?

Avatar

Author : Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.


Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *