Emails with no body text and subject lines containing a string of letters and numbers and image file extensions such as .jpg or .tiff are currently hitting inboxes. The emails contain attachments with the same names and image file extensions that are featured in the subject lines.
Sometimes, very simple social engineering tricks can be quite effective. In this malware campaign, the malicious emails have no content in the body, but are designed to give the impression that the attachment that comes with the emails contains a harmless image file.
The subject lines of the emails often feature the letters CCE along with a string of numbers followed by an image file extension such as .jpg, .gif, or .tiff. Over the last few days, we’ve received emails with the subject lines ‘CCE29032016_00084.tiff’, ‘CCE29032016_00021.gif’, ‘CCE29032016_00026.jpg’, and dozens of others. The emails usually include the notice ‘Sent from my iPhone’ in the footer.
The emails have attachments with the same names and image file extensions as shown in the subject lines. However, the attachments actually have double extensions such as .jpg.zip or .tiff.rar. Windows users who have file extensions hidden will only see ‘.jpg’ or ‘.tiff’ and may therefore assume that the attachments just contain images.
Unfortunately, there is no easy way to get rid of this malware and recover your files. If you have recent, off-computer backups, you should be able to recover your files from the backups. Without backups, however, it may be impossible to unlock your files unless you pay the ransom demanded by the criminals. If you do pay, you MAY receive the promised decryption key. However, given that you will be dealing with anonymous criminals, there is certainly no guarantee that you will ever receive the key.
Note that some versions of these emails may omit the file extension from the subject line and just have the letters and numbers. And, the letters, numbers, and file extensions may vary considerably in different versions. There are also many other Locky ransomware emails currently being distributed. Check the reference list below for reports on other Locky campaigns.
Last updated: March 31, 2016
First published: March 31, 2016
By Brett M. Christensen
‘Payment Declined’ Emails Contain Locky Ransomware
Bogus ‘Payment Accepted’ Email Carries Locky Ransomware
Fake ‘Order Status’ Emails Contain Locky Malware
‘Received Documents From Your Bank’ Emails Contain Locky Ransomware
“Locky” ransomware – what you need to know
How to show or hide file extensions in Windows
Since you’ve read this far……can I ask you for a big favour?
To enhance your privacy and security and offer you a better user experience, Hoax-Slayer is now ad-free. To keep the site online, I now rely on voluntary contributions from site visitors along with commissions from a few trusted products and services that I promote via reviews on the site.
If you found the above report useful, please consider supporting Hoax-Slayer by making a donation. Any amount you can give will be greatly appreciated.
You can donate using your credit card via the form below. Donations are collected securely via the online payment service Stripe. Stripe uses state of the art security to keep your data safe.