{"id":27999,"date":"2022-02-23T05:55:58","date_gmt":"2022-02-23T05:55:58","guid":{"rendered":"https:\/\/nftsgary.com\/?p=32"},"modified":"2022-02-23T05:55:58","modified_gmt":"2022-02-23T05:55:58","slug":"more-locky-ransomware-delivered-via-dde-exploit-pretending-to-come-from-your-own-company-or-email-address","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/more-locky-ransomware-delivered-via-dde-exploit-pretending-to-come-from-your-own-company-or-email-address\/","title":{"rendered":"More Locky Ransomware Delivered Via DDE Exploit Pretending To Come From Your Own Company or Email Address"},"content":{"rendered":"

A second big Locky ransomware campaign using the DDE exploit<\/a> hit UK late last night ( and probably other countries at same time) with an email with multiple different subjects once again pretending to come from random names at your own email address or company domain. These emails have a blank, empty body. The faked sender starts with a female name.random numbers @ your email address. For example opehelia1234@victimdomain.tld or jenny12@victimdomain.tld etc.<\/p>\n

It should be noted that on my mail server the default Antivrus setup on my mailscanner<\/a> using ClamAv detects these and quarantines them. I would hope that other mail servers will have similar default out of the box protection.<\/p>\n

\"\"<\/p>\n

Subjects seen include:<\/p>\n