{"id":1220,"date":"2016-02-24T18:24:30","date_gmt":"2016-02-24T16:24:30","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky"},"modified":"2024-05-07T20:01:20","modified_gmt":"2024-05-07T18:01:20","slug":"how-to-protect-yourself-from-blackmail-trojan-locky","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/it\/how-to-protect-yourself-from-blackmail-trojan-locky\/","title":{"rendered":"How to protect yourself from blackmail trojan Locky"},"content":{"rendered":"

Since last week the aggressive blackmail trojan Locky has been causing mischief on computers around the globe. According to media<\/a> reports<\/a> the virus mostly finds its way onto the network via macros in Microsoft Office documents. When the recipient opens an attachment, for instance containing a fake invoice, Locky encrypts all files on the affected computer. At the same time the malware also spreads via the network within the company, to active devices in USB drives or cloud storage with remarkable speed. After the computer has become infected, the user is then asked to pay a ransom for the decryption of the data. A blackmail letter appears on the screen with a demand for payment. It\u2019s virtually impossible to crack this encryption. The German Federal Office for Information Security (BSI) strongly advises victims against giving in to demands for ransom. Instead, one should take a photo of the blackmail letter on the screen and immediately report the incident to the police. <\/p>\n

Free Retarus E-Mail Security upgrade ensures maximum protection<\/h2>\n

Currently there is no virus protection software which provides total protection against such attacks. Retarus E-Mail Security<\/a> services offer significantly higher levels of security by combining several virus scanners, as well as intelligent spam and phishing filters. To ensure the best possible protection against this crypto Trojan, customers using Retarus E-Mail Security will receive a free upgrade for a limited period of time: Retarus will expand existing spam and virus protection functions and switch all customers over to fourfold virus scanning for the duration of the current, acute threat.<\/strong> <\/p>\n

Beware of files with embedded macro code<\/h2>\n

But even the best anti-virus software is no substitute for the vigilance of users. In order to best safeguard themselves against attacks by Locky and similar ransomware, users should also deactivate the automatic execution of macro code in office programs, and to be especially careful when running macros which are absolutely essential. You can find out here<\/a> how to make the appropriate settings in Microsoft Office. <\/p>\n

General attentiveness required<\/h2>\n

Users should additionally heed the following tips: <\/p>\n