New strain of ransomware mimics Locky
Hades Locker is similar to Locky, but targets manufacturing and business services

Security researchers have discovered a new ransomware campaign targeting manufacturing and business service sectors in Western Europe.
The campaign, dubbed Hades Locker, was detected in emails containing hyperlinks to a Microsoft Word document named "levering-1478529.doc" on several websites with recently registered domains.
In a blog post, the firm said it suspected a connection to previous CryptFile2 and MarsJoke campaigns that Proofpoint and others have documented based on the sending botnet and the distribution techniques (transportation-related email lures). Visually, Hades Lucker mimics early versions of Locky.
In contrast with these previous campaigns directed at state and local government agencies, however, Hades Locker targets manufacturing and business services.
This malicious software alerted victims that their files were encrypted, by creating several types of files scattered throughout their file system.
"The ransom message is dropped to the victim's Desktop, as a text file, HTML file, and an image. The message urges the victim to "buy the decryption password belonging to your files." In order to do this, the victim is instructed to visit a web page or an onion site," the company said.
This website asks for one bitcoin (equivalent to 600 USD) in order to receive the decrypting software.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
As a guarantee' that the decryption works, victims can also submit a single encrypted file and receive its decrypted version within 24 hours.
Proofpoint says: "Ransoms are increasing and actors are exploring new distribution methods such as links to hosted malware. As ransomware is increasingly commoditised and ransomware variants share features and aesthetics, we will continue to monitor the evolution of the market and its impact on businesses and individuals."
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.
-
Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model
News Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API.
-
Data I/O shuts down systems in wake of ransomware attack
News Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos