First Ransomware to Use Intermittent Encryption Revealed

Sophos revealed that a recently discovered ransomware family called LockFile is the first to use a technique called intermittent encryption to evade detection.

Symantec reported on August 20 that LockFile had been targeting organizations in the "manufacturing, financial services, engineering, legal, business services, and travel and tourism sectors" since at least July 20. But the company offered limited information about how LockFile spread or how it actually encrypted victims' files.

Ransomware exploiting publicly disclosed vulnerabilities to conduct a well-known attack on Exchange servers isn't particularly novel. That's where Sophos comes in. The company said that LockFile is the first ransomware it's encountered that uses intermittent encryption to prevent security tools from detecting its activity.

"Intermittent encryption helps the ransomware to evade detection by some ransomware protection solutions because an encrypted document looks statistically very similar to the unencrypted original," Sophos said, which means LockFile can encrypt its victims' files without having to worry about those security tools.

Here's how Sophos explained what sets LockFile's encryption method apart:

Nathaniel Mott
Freelance News & Features Writer

Nathaniel Mott is a freelance news and features writer for Tom's Hardware US, covering breaking news, security, and the silliest aspects of the tech industry.

  • ThatMouse
    That's not much of a ransomware protection if you're detecting it AFTER the files are already encrypted! What's the alert say: "Hope you've backed up, because we got some bad news!"
    Reply