Locky Unleashes Multiple Spam Waves with a New Variant “ykcol“

September 21, 2017

While FortiGuard Labs was preparing for another presentation on our Locky research at the Black Alps cyber security conference this coming November in Switzerland, Fortinet’s Kadena Threat Intelligence System (KTIS)1 caught another Locky variant using a new extension – “ykcol” or “locky” spelled backwards. Locky has been stepping up its game over the past few months after going dark during the first half of 2017. Just like the old days, this new variant is distributed through massive volumes of malicious...

Read more...

Previous Article
Gartner Peer Insights for Enterprise Firewalls
Gartner Peer Insights for Enterprise Firewalls

See What Government Leaders are Saying About Fortinet

Next Article
Evasive Malware Campaign Abuses Free Cloud Service, Targets Korean Speakers
Evasive Malware Campaign Abuses Free Cloud Service, Targets Korean Speakers

Earlier this month, FortiGuard Labs researchers published findings about a malware campaign exploiting a Po...