FireEye researchers spotted a Locky ransomware campaign using Javascript downloaders to infect users instead of macro– or binary-based downloaders. Threat actors are sending the malicious downloaders using malicious .zip and .rar files disguised as invoices, corporate documents, tax information, and other seemingly benign files in order to spread the new downloader.
View full story
ORIGINAL SOURCE: SC Magazine