This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
A new ransomware, known as Lucky, has been observed targeting Linux servers.
Threat details
At the time of publication, it is unclear how Lucky is being delivered. However, it is known to exploit several vulnerabilities to gain access to affected devices. Once a device has been compromised, an infection script will automatically deploy Lucky.
Once installed, Lucky will read the /tmp/Ssession file and encrypt all system files with extensions matching a hard-coded list. It will then generate a ransom note named _How_To_Decrypt_My_File_.txt and display it in the message of the day section. It will then attempt to propagate locally by scanning for other vulnerable machines on the network.
Analysis of Lucky's source code indicates it can target Windows-based devices, although at the time of publication there have been no confirmed reports of infection.
For further information:
Remediation steps
| Type | Step |
|---|---|
|
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
CVE Vulnerabilities
Last edited: 17 February 2020 12:59 pm