{"id":1040,"date":"2017-09-26T03:51:15","date_gmt":"2017-09-26T00:51:15","guid":{"rendered":"https:\/\/community.virtono.com\/?p=1040"},"modified":"2017-09-25T05:01:42","modified_gmt":"2017-09-25T02:01:42","slug":"locky-ransomwares-authors-big-fans-of-game-of-thrones","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/locky-ransomwares-authors-big-fans-of-game-of-thrones\/","title":{"rendered":"Locky Ransomware&#8217;s Authors : Big Fans of Game Of Thrones"},"content":{"rendered":"<p>One of the most viewed T.V shows of our time\u00a0Game Of Thrones has found its viewers in all forms of diversities the most recent ones are criminal-type more particularly the Authors of\u00a0Locky Ransomware. Researchers at PhishMe have found the names of various\u00a0Game Of Thrones characters and other references in the script.<\/p>\n<p>&nbsp;<\/p>\n<p><em>\u201cLightweight script applications designed to deliver malware often use rotating or pseudorandom variable names to ensure that the malware delivery tools look unique. In this case, many of the variables (some misspelled) referred to characters and events from the globally-popular television fantasy epic Game of\u00a0<\/em>Thrones,<em>\u201d\u00a0<a href=\"https:\/\/phishme.com\/song-ice-ransomware-game-thrones-references-locky-phishing\/\" target=\"_blank\" rel=\"noopener\">states<\/a>\u00a0Phishme.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Phishing attacks like these are targeted to exploit the\u00a0proclivities and to track people within an organization. While small threats in no way require any special attention, it wasn&#8217;t paradigm shifting. But it got light because of using Game Of Thrones characters and other references to spread the Ransomware. But this also proves that threats like these aren&#8217;t otherworldly phenomena they are created by people like you and me, maybe I&#8217;ll make a tutorial someday. But joking aside this helps us dive into the minds of these so-called\u00a0criminals and helps us to tackle\u00a0them more efficiently.<\/p>\n<p>We are able to rip open their tactics, techniques, and procedures for methodically spreading threats like these.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1041\" data-permalink=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/locky-ransomwares-authors-big-fans-of-game-of-thrones\/attachment\/whatsapp-image-2017-09-25-at-07-12-16\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&amp;ssl=1\" data-orig-size=\"768,254\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"WhatsApp Image 2017-09-25 at 07.12.16\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=750%2C248&amp;ssl=1\" class=\"alignnone wp-image-1041\" src=\"https:\/\/i0.wp.com\/community.virtono.com\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16-300x99.jpeg?resize=750%2C248&#038;ssl=1\" alt=\"\" width=\"750\" height=\"248\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?resize=300%2C99&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?w=768&amp;ssl=1 768w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p><em>\u201cThe runtime for this script is indifferent to the variable names. The variable names could be anything, including completely random combinations of letters and numbers. However, the criminals responsible for this attack chose a distinctive theme for their variables, thereby revealing their interest in this pop culture phenomenon.\u201d continues PhishMe.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the most viewed T.V shows of our time\u00a0Game Of Thrones has found its viewers in all forms of diversities the most recent ones are criminal-type more particularly the Authors of\u00a0Locky Ransomware. Researchers at PhishMe have found the names of various\u00a0Game Of Thrones characters and other references in the<\/p>\n","protected":false},"author":3,"featured_media":1041,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-1040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-and-technology-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-gM","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":792,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/stopping-malware-propagation\/","url_meta":{"origin":1040,"position":0},"title":"Stopping malware propagation","author":"Daniel Draga","date":"December 8, 2016","format":false,"excerpt":"The use of mobile devices in our everyday lives has become widespread. In recent years, the number of smartphones sold globally has surpassed the number of desktop computers sold. Malware authors have followed this and developed sophisticated malware addressed both at the mobile device platforms as well as desktop platforms.\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/browser-redirects-hijacking-malware-virus-1024x787.jpg?fit=1024%2C787&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/browser-redirects-hijacking-malware-virus-1024x787.jpg?fit=1024%2C787&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/browser-redirects-hijacking-malware-virus-1024x787.jpg?fit=1024%2C787&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/browser-redirects-hijacking-malware-virus-1024x787.jpg?fit=1024%2C787&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":789,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/malware-attack-on-virtual-machines\/","url_meta":{"origin":1040,"position":1},"title":"MALWARE ATTACK ON VIRTUAL MACHINES","author":"Daniel Draga","date":"December 6, 2016","format":false,"excerpt":"Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward. \u00a0 Enterprises are increasingly adopting virtualization technology, according\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/mobile-malware_126852062-thumb-380xauto-2252.jpg?fit=380%2C304&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":984,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/malware-detection-on-your-server\/","url_meta":{"origin":1040,"position":2},"title":"Malware Detection On Your Server","author":"Daniel Draga","date":"June 26, 2017","format":false,"excerpt":"The term malware encompasses a large range of unwelcome software that is designed to damage a computer. A partial list of malware might, for example, include viruses, spyware, Trojan horses, and worms. The rapid proliferation of such software is enough to concern users of all levels, from novices to seasoned\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1060,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/freemilk-new-phishing-campaign-to-hijack-email-conversations\/","url_meta":{"origin":1040,"position":3},"title":"FreeMilk : New phishing campaign to hijack email conversations","author":"Shreyash Sharma","date":"October 8, 2017","format":false,"excerpt":"A new threat has been identified by\u00a0\u00a0Palo Alto Networks security researchers, it is a\u00a0phishing campaign used by hackers to intercept ongoing email conversations between individuals and hijack them to deploy malware.The focus on even now believes they are in contact with the particular person they had been at first messaging,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":198,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/us-authorities-seize-kickasstorrents-domains-arrests-owner\/","url_meta":{"origin":1040,"position":4},"title":"US Authorities seize KICKASSTORRENTS Domains, Arrests Owner","author":"Daniel Draga","date":"July 26, 2016","format":false,"excerpt":"After years of fighting against the \u201cPirates\u201d of the copyright world the US government was finally able to track down the alleged owner of the torrent website kat.cr, otherwise known as the infamous kickass torrents. It was April of last year when the website was moved to a new domain\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/katfor.jpg?fit=600%2C450&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/katfor.jpg?fit=600%2C450&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/katfor.jpg?fit=600%2C450&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":711,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/web-servers-must-know-introduction\/","url_meta":{"origin":1040,"position":5},"title":"Web Servers : Must Know Introduction","author":"Daniel Draga","date":"October 21, 2016","format":false,"excerpt":"Web Server Definition A Web server is a program that generates and transmits responses to client requests for Web resources. \uf0a7 Handling a client request consists of several key steps: \uf0d8 Parsing the request message \uf0d8 Checking that the request is authorized \uf0d8 Associating the URL in the request with\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/smtp-server.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/smtp-server.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/smtp-server.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/smtp-server.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/smtp-server.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=1040"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1040\/revisions"}],"predecessor-version":[{"id":1042,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1040\/revisions\/1042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/1041"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=1040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=1040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=1040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}