Skip to main content

M2M - Locky 2017-10-04 : Affid=3, offline, ".ykcol" : "Message from 02087654321" - "Voice Message.7z"

Low
Published: Thu Oct 05 2017 (10/05/2017, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: tlp
Product: white

Description

M2M - Locky 2017-10-04 : Affid=3, offline, ".ykcol" : "Message from 02087654321" - "Voice Message.7z"

AI-Powered Analysis

AILast updated: 07/02/2025, 14:27:12 UTC

Technical Analysis

The provided information describes a variant of the Locky ransomware identified around October 4, 2017. Locky is a well-known ransomware family that encrypts victims' files and demands payment for decryption keys. This specific variant is referenced with the suffix ".ykcol" and is associated with a phishing lure involving a message from a phone number (02087654321) and a compressed archive named "Voice Message.7z". The attack vector likely involves social engineering where victims receive a message prompting them to open the archive, which then executes the ransomware payload. Once executed, Locky encrypts files on the infected system, rendering them inaccessible and appending the ".ykcol" extension to encrypted files. The ransomware's offline mode suggests that it may not require immediate communication with a command and control server to operate, which can complicate detection and mitigation. Although the severity is marked as low in the source, Locky ransomware historically has caused significant disruption due to its encryption capabilities. The lack of affected versions and patch links indicates this is a generic malware campaign rather than a vulnerability in a specific product. No known exploits in the wild are reported beyond the malware's own propagation methods. The threat level of 3 (on an unspecified scale) and the low severity rating may reflect the dated nature of this variant or limited impact observed at the time of reporting.

Potential Impact

For European organizations, the impact of this Locky ransomware variant can be significant despite the low severity rating. If successful, the ransomware encrypts critical business data, leading to operational disruption, potential data loss, and financial costs related to recovery or ransom payments. The use of social engineering via voice message-themed phishing can bypass some technical controls by exploiting human factors. Organizations with insufficient email filtering, user awareness training, or endpoint protection may be vulnerable. The offline mode of the ransomware means it can encrypt files even without network connectivity, increasing the risk of damage in isolated environments. Additionally, encrypted backups or network shares could be targeted if accessible, amplifying the impact. While Locky campaigns have declined since their peak, legacy or unpatched systems in Europe could still be at risk, especially in sectors with high reliance on email communications and less mature cybersecurity postures.

Mitigation Recommendations

To mitigate this threat, European organizations should implement multi-layered defenses focused on both technical controls and user awareness. Specifically: 1) Enhance email filtering to detect and quarantine suspicious attachments, especially compressed archives like .7z files from unknown or unexpected sources. 2) Conduct regular user training emphasizing the risks of opening unsolicited attachments or links, particularly those mimicking voice messages or urgent communications. 3) Deploy and maintain updated endpoint protection solutions capable of detecting ransomware behaviors and blocking execution of known Locky variants. 4) Implement application whitelisting to prevent unauthorized execution of scripts or executables from temporary or user directories. 5) Maintain offline, immutable backups of critical data to enable recovery without paying ransom. 6) Monitor network traffic and endpoint logs for indicators of ransomware activity, including unusual file renaming or encryption patterns. 7) Restrict user permissions to limit the ability of ransomware to encrypt network shares or critical system files. 8) Regularly patch and update all systems to reduce exposure to malware delivery mechanisms. Given the offline nature of this variant, network isolation and segmentation can also limit spread within an organization.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
3
Analysis
1
Original Timestamp
1507233773

Threat ID: 682acdbdbbaf20d303f0bc18

Added to database: 5/19/2025, 6:20:45 AM

Last enriched: 7/2/2025, 2:27:12 PM

Last updated: 8/1/2025, 4:41:36 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats