First Ransomware to Use Intermittent Encryption Revealed

Sophos revealed that a recently discovered ransomware family called LockFile is the first to use a technique called intermittent encryption to evade detection.

Symantec reported on August 20 that LockFile had been targeting organizations in the "manufacturing, financial services, engineering, legal, business services, and travel and tourism sectors" since at least July 20. But the company offered limited information about how LockFile spread or how it actually encrypted victims' files.

Article continues below

Ransomware exploiting publicly disclosed vulnerabilities to conduct a well-known attack on Exchange servers isn't particularly novel. That's where Sophos comes in. The company said that LockFile is the first ransomware it's encountered that uses intermittent encryption to prevent security tools from detecting its activity.

"Intermittent encryption helps the ransomware to evade detection by some ransomware protection solutions because an encrypted document looks statistically very similar to the unencrypted original," Sophos said, which means LockFile can encrypt its victims' files without having to worry about those security tools.

Here's how Sophos explained what sets LockFile's encryption method apart:

Nathaniel Mott
Freelance News & Features Writer
  • ThatMouse
    That's not much of a ransomware protection if you're detecting it AFTER the files are already encrypted! What's the alert say: "Hope you've backed up, because we got some bad news!"
    Reply