{"id":1220,"date":"2016-02-24T18:24:30","date_gmt":"2016-02-24T16:24:30","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky"},"modified":"2024-05-07T20:01:20","modified_gmt":"2024-05-07T18:01:20","slug":"how-to-protect-yourself-from-blackmail-trojan-locky","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/","title":{"rendered":"How to protect yourself from blackmail trojan Locky"},"content":{"rendered":"<p>Since last week the aggressive blackmail trojan Locky has been causing mischief on computers around the globe. According to <a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/02\/18\/ransomware-hollywood-payment-locky-menace\/#1709fd9675b0\" target=\"_blank\" rel=\"noopener noreferrer\">media<\/a> <a href=\"https:\/\/www.pcworld.com\/article\/3033886\/locky-ransomware-which-infects-like-dridex-hits-the-unlucky.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> the virus mostly finds its way onto the network via macros in Microsoft Office documents. When the recipient opens an attachment, for instance containing a fake invoice, Locky encrypts all files on the affected computer. At the same time the malware also spreads via the network within the company, to active devices in USB drives or cloud storage with remarkable speed. After the computer has become infected, the user is then asked to pay a ransom for the decryption of the data. A blackmail letter appears on the screen with a demand for payment. It\u2019s virtually impossible to crack this encryption. The German Federal Office for Information Security (BSI) strongly advises victims against giving in to demands for ransom. Instead, one should take a photo of the blackmail letter on the screen and immediately report the incident to the police. <\/p>\n<h2>Free Retarus E-Mail Security upgrade ensures maximum protection<\/h2>\n<p> Currently there is no virus protection software which provides total protection against such attacks. <a href=\"https:\/\/www.retarus.com\/products\/retarus-email-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Retarus E-Mail Security<\/a> services offer significantly higher levels of security by combining several virus scanners, as well as intelligent spam and phishing filters. <strong>To ensure the best possible protection against this crypto Trojan, customers using Retarus E-Mail Security will receive a free upgrade for a limited period of time: Retarus will expand existing spam and virus protection functions and switch all customers over to fourfold virus scanning for the duration of the current, acute threat.<\/strong> <\/p>\n<h2>Beware of files with embedded macro code<\/h2>\n<p> But even the best anti-virus software is no substitute for the vigilance of users. In order to best safeguard themselves against attacks by Locky and similar ransomware, users should also deactivate the automatic execution of macro code in office programs, and to be especially careful when running macros which are absolutely essential. You can find out <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/Encyclopedia\/Entry.aspx?Name=Ransom:Win32\/Locky.A\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> how to make the appropriate settings in Microsoft Office. <\/p>\n<h2>General attentiveness required<\/h2>\n<p> Users should additionally heed the following tips: <\/p>\n<ul>\n<li>Only open e-mail attachments if the e-mail appears to be trustworthy. Do you know the sender and are you familiar with the procedure described in the e-mail? You need to exercise particular caution with file formats ending in the following file extensions: .doc, .docx, .docxm, .xls, .xlsx, .xlsxm, .exe.<\/li>\n<li>Extremely sluggish responsiveness of the computer, high levels of hard drive activity without apparent reason or files with the extension .locky on your hard disk could be indications that the Locky encryption is already underway. In order to potentially save your existing data, the computer should be disconnected from the network and power sources at once. Shut your computer down and remove the battery pack from your notebook if necessary.<\/li>\n<li>Back your data up regularly, so that data that may be affected can quickly be restored with as little loss of data as possible. It is essential to consider when backing up, that Locky can also attack external storage devices if they are permanently connected to the computer.<\/li>\n<li>Always keep your operating system updated to the latest version: install all the latest patches for your operating system, your office applications, your internet browser, Flash Player and PDF reader. Locky and other similar ransomware find their way into your systems through so-called \u201cback doors\u201d. These gateways are created by security gaps in the operating systems or software, for instance the browser. Regular updates can generally shut a lot of these gateways.<\/li>\n<li>Install virus scanners on all your systems. It is also essential to keep this software up to date, so that is able to recognize current malware.<\/li>\n<\/ul>\n<p> You can find out more about the free virus scan upgrade for <a href=\"https:\/\/www.retarus.com\/products\/retarus-email-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Retarus E-Mail Security<\/a> directly from your <a href=\"https:\/\/www.retarus.com\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\">local Retarus contact person<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since last week the aggressive blackmail Trojan Locky has been causing mischief on computers around the globe. Retarus expands existing spam and virus protection functions and switch all customers over to fourfold virus scanning for the duration of the current, acute threat. To protect yourself as well as possible from attacks by Locky and similar ransomware, users should additionally be vigilant when running macros.<\/p>\n","protected":false},"author":11,"featured_media":324,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[8,15],"tags":[102,197,23,198,199],"class_list":["post-1220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-email-security","tag-locky","tag-online-fraud","tag-ransomware","tag-trojan"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to protect yourself from blackmail trojan Locky<\/title>\n<meta name=\"description\" content=\"Retarus switchs all customers over to fourfold virus scanning for the duration of the current threat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect yourself from blackmail trojan Locky\" \/>\n<meta property=\"og:description\" content=\"Retarus switchs all customers over to fourfold virus scanning for the duration of the current threat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - IT\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-24T16:24:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T18:01:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2015\/06\/Technik_680x384.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sabrina Hiller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sabrina Hiller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/\"},\"author\":{\"name\":\"Sabrina Hiller\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#\\\/schema\\\/person\\\/b52ddf77ed41a8431c9b47c4d18942d7\"},\"headline\":\"How to protect yourself from blackmail trojan Locky\",\"datePublished\":\"2016-02-24T16:24:30+00:00\",\"dateModified\":\"2024-05-07T18:01:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/\"},\"wordCount\":637,\"image\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2015\\\/06\\\/Technik_680x384.jpg\",\"keywords\":[\"Email Security\",\"Locky\",\"Online Fraud\",\"Ransomware\",\"Trojan\"],\"articleSection\":[\"News\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/\",\"name\":\"How to protect yourself from blackmail trojan Locky\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2015\\\/06\\\/Technik_680x384.jpg\",\"datePublished\":\"2016-02-24T16:24:30+00:00\",\"dateModified\":\"2024-05-07T18:01:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#\\\/schema\\\/person\\\/b52ddf77ed41a8431c9b47c4d18942d7\"},\"description\":\"Retarus switchs all customers over to fourfold virus scanning for the duration of the current threat.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2015\\\/06\\\/Technik_680x384.jpg\",\"contentUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2015\\\/06\\\/Technik_680x384.jpg\",\"width\":680,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/how-to-protect-yourself-from-blackmail-trojan-locky\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect yourself from blackmail trojan Locky\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/\",\"name\":\"Retarus Corporate Blog - IT\",\"description\":\"Sempre aggiornati\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/#\\\/schema\\\/person\\\/b52ddf77ed41a8431c9b47c4d18942d7\",\"name\":\"Sabrina Hiller\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/it\\\/author\\\/shiller\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to protect yourself from blackmail trojan Locky","description":"Retarus switchs all customers over to fourfold virus scanning for the duration of the current threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/","og_locale":"it_IT","og_type":"article","og_title":"How to protect yourself from blackmail trojan Locky","og_description":"Retarus switchs all customers over to fourfold virus scanning for the duration of the current threat.","og_url":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/","og_site_name":"Retarus Corporate Blog - IT","article_published_time":"2016-02-24T16:24:30+00:00","article_modified_time":"2024-05-07T18:01:20+00:00","og_image":[{"width":680,"height":384,"url":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2015\/06\/Technik_680x384.jpg","type":"image\/jpeg"}],"author":"Sabrina Hiller","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Sabrina Hiller","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/#article","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/"},"author":{"name":"Sabrina Hiller","@id":"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/b52ddf77ed41a8431c9b47c4d18942d7"},"headline":"How to protect yourself from blackmail trojan Locky","datePublished":"2016-02-24T16:24:30+00:00","dateModified":"2024-05-07T18:01:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/"},"wordCount":637,"image":{"@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2015\/06\/Technik_680x384.jpg","keywords":["Email Security","Locky","Online Fraud","Ransomware","Trojan"],"articleSection":["News","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/","url":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/","name":"How to protect yourself from blackmail trojan Locky","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2015\/06\/Technik_680x384.jpg","datePublished":"2016-02-24T16:24:30+00:00","dateModified":"2024-05-07T18:01:20+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/b52ddf77ed41a8431c9b47c4d18942d7"},"description":"Retarus switchs all customers over to fourfold virus scanning for the duration of the current threat.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2015\/06\/Technik_680x384.jpg","contentUrl":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2015\/06\/Technik_680x384.jpg","width":680,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/it\/"},{"@type":"ListItem","position":2,"name":"How to protect yourself from blackmail trojan Locky"}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/it\/#website","url":"https:\/\/www.retarus.com\/blog\/it\/","name":"Retarus Corporate Blog - IT","description":"Sempre aggiornati","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/b52ddf77ed41a8431c9b47c4d18942d7","name":"Sabrina Hiller","url":"https:\/\/www.retarus.com\/blog\/it\/author\/shiller\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/1220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/comments?post=1220"}],"version-history":[{"count":6,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/1220\/revisions"}],"predecessor-version":[{"id":8625,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/1220\/revisions\/8625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/media\/324"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/media?parent=1220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/categories?post=1220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/tags?post=1220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}