{"id":97708,"date":"2019-12-05T07:00:19","date_gmt":"2019-12-05T15:00:19","guid":{"rendered":"\/blogs\/?p=97708"},"modified":"2024-07-05T06:03:28","modified_gmt":"2024-07-05T13:03:28","slug":"analysis-of-loocipher-a-new-ransomware-family-observed-this-year","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/","title":{"rendered":"Analysis of LooCipher, a New Ransomware Family Observed This Year"},"content":{"rendered":"<p>Co-authored by Marc RiveroLopez.<\/p>\n<h3>Initial Discovery<\/h3>\n<p>This year seems to again be the year for ransomware. Notorious attacks were made using ransomware and new families are being detected almost on a weekly basis.<\/p>\n<p>The McAfee ATR team has now analyzed a new ransomware family with some special features we would like to showcase. LooCipher represents how a new actor in an early stage of development used the same techniques of distribution as other players in the ransomware landscape. The design of the ransomware note reminded us of the old times of Cerber ransomware, a very well impacted design to force the user to pay the rescue.<\/p>\n<p>Thanks to initiatives like the \u2018No More Ransom\u2019 project, one of the partners involved has already provided a valid decryptor to restore files encrypted by LooCipher.<\/p>\n<h3>McAfee Telemetry<\/h3>\n<p>Based on the data we manage, we detected LooCipher infections in the following regions:<\/p>\n<h2>Campaign Analysis:<\/h2>\n<p>Based on the analysis we performed, this ransomware was delivered through a DOC file. The content and techniques used with this MalDoc are quite simple compared to other doc files used to spread malware, such as Emotet. No special social engineering techniques were applied; the authors only put a simple message on it &#8211; \u201cEnable macros\u201d.<\/p>\n<p>The file is prepared to download LooCipher from a remote server upon opening the file. We can see the Sub AutoOpen function as a macro in the document:<\/p>\n<p>LooCipher will start its encryption routine using a predefined set of characters, creating a block of 16 bytes and using the local system hour:<\/p>\n<p>The ransomware will use the AES-ECB encryption algorithm in the process and the key is the same for all the files which facilitates the file recovery process. Other ransomware families use a different key for each file to avoid the possibility of a brute force attack discovering the key used during the infection.<\/p>\n<p>In the encryption process, the ransomware will avoid 3 special folders in the system so as to not break their functionality.<\/p>\n<p>Encrypting key files and folders was one of the mistakes we highlighted in our analysis of <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/lockergoga-ransomware-family-used-in-targeted-attacks\/\">LockerGoga<\/a>; that ransomware was completely breaking the functionality of the system. Some binaries found were encrypting all the system, including the LockerGoga binary file.<\/p>\n<p>Regarding the extensions that LooCipher will search and encrypt in the system, the list is hardcoded inside the binary:<\/p>\n<p>It is quite interesting see how LooCipher searches for extensions that are not present in Windows systems like \u201c.dmg.\u201d This suggests that the authors may just be going to code sites to find extension lists.<\/p>\n<p>In the analysis we found a PDB reference:<\/p>\n<p><em>\\\\Users\\\\Usuario\\\\Documents\\\\Proyectos\\\\sher.lock\\\\Debug\\\\LooCipher.pdb<\/em><\/p>\n<p>It is interesting to note that the reference found contains Spanish words, as if the user was using folders named in Spanish, however, the system is configured in English. We currently have no idea why this is so, but it is curious.<\/p>\n<p>BTC payment is the method chosen by LooCipher authors to get money from the victims. So, at the end of the file\u2019s encryption, the ransomware will show a rescue note to the user:<\/p>\n<p>LooCipher decryptor will pop up in the system as well with a specific countdown:<\/p>\n<p>In the ransom note LooCipher says the BTC address is specifically generated for the user but that is not true; all the BTC addresses we have seen are hardcoded in the binary:<\/p>\n<p>This is another special characteristic for this ransomware. Normally, this workflow is providing an email address to contact the authors so they can provide the instructions to the victim, or at least a BTC address to make payment (if there is not a unique BTC address provided to every victim), something that is the main difference between RaaS and one-shot campaigns.<\/p>\n<p>If we apply static analysis in the binaries we have, the same bundle of BTC addresses is included across most that we spot in the wild:<\/p>\n<p>None of the BTC addresses found regarding LooCipher showed any transactions so we believe the authors did not monetize the campaign with the binaries we analyzed.<\/p>\n<h2>LooCipher and Network Traffic:<\/h2>\n<p>In the encryption process, LooCipher will contact the C2 server and send information about the victim:<\/p>\n<p>The data sent to the server is:<\/p>\n<p>Here, a copy of the network traffic could help the user to know the encryption key used.<\/p>\n<h3>Decryptor Fallback Mechanism Implemented by LooCipher<\/h3>\n<p>The LooCipher authors provide a fallback mechanism to help victims access the instructions and the decryptor again, in case they close the LooCipher window when it appears in the system after encrypting the files:<\/p>\n<p>The mechanism sees the LooCipher binary uploaded to the Mega platform. In case the user wants to get the BTC address or decrypt the files after making the payment, they can download this binary and use it. If the files were previously encrypted by LooCipher they would not be encrypted again according to the ransomware\u2019s authors.<\/p>\n<h3>I\u2019m Infected by LooCipher. How Can I Get my Files Back?<\/h3>\n<p>McAfee is one of the founders and contributors of the \u2018No More Ransom\u2019 project. One of our fellow stakeholders created a decryptor for all the files encrypted by LooCipher:<\/p>\n<p>So, if you are infected with LooCipher, it is possible get your files back.<\/p>\n<h2>Conclusions:<\/h2>\n<p>LooCipher authors are not a sophisticated actor compared to other families like Ryuk, LockerGoga or REVil. They tried to spread their ransomware combining the infection with an Office file with a simple macro.<\/p>\n<p>It will be impossible for the authors to come back to the scene if they do not change how the ransomware works.<\/p>\n<p>The McAfee ATR Team advises against paying the ransomware demands and, instead, recommends:<\/p>\n<ul>\n<li>Saving a copy of your encrypted files \u2013 sometimes in the future a decryptor may be released<\/li>\n<li>Having a solid backup workflow in the company<\/li>\n<li>Implementing best practices in terms of Cybersecurity<\/li>\n<\/ul>\n<h3>YARA Rule<\/h3>\n<p>We uploaded a <a href=\"https:\/\/github.com\/advanced-threat-research\/Yara-Rules\/blob\/master\/ransomware\/RANSOM_Loocipher.yar\" target=\"_blank\" rel=\"noopener noreferrer\">YARA rule<\/a> to detect almost all the samples observed in the wild.<\/p>\n<h3>MITRE ATT&amp;CK Coverage:<\/h3>\n<ul>\n<li>Hooking<\/li>\n<li>Defense Evasion<\/li>\n<li>Network Service Scanning<\/li>\n<li>System Information Discovery<\/li>\n<li>Data Compressed<\/li>\n<\/ul>\n<h3>McAfee Coverage:<\/h3>\n<ul>\n<li>Artemis!02ACC0BC1446<\/li>\n<li>Artemis!12AA5517CB7C<\/li>\n<li>Artemis!1B1335F20CD0<\/li>\n<li>Artemis!362AB3B56F40<\/li>\n<li>Artemis!64FCC1942288<\/li>\n<li>Artemis!8F421FE340E7<\/li>\n<li>Artemis!983EF1609696<\/li>\n<li>Artemis!A11724DBE1D6<\/li>\n<li>Artemis!A7ABF760411F<\/li>\n<li>Artemis!B9246AA9B474<\/li>\n<li>Artemis!F0D98A6809C1<\/li>\n<li>McAfee-Ransom-O<\/li>\n<li>Ransomware-GNY!3B9A8D299B2A<\/li>\n<li>Ransomware-GNY!66571E3C8036<\/li>\n<li>Ransomware-GNY!9CF3C9E4A9B5<\/li>\n<li>Ransomware-GNY!A0609D7AD404<\/li>\n<li>Ransomware-GNY!A77FDEFE40BE<\/li>\n<li>Ransomware-GNY!A9B6521FF980<\/li>\n<li>Ransomware-GNY!D3CE02AD4D75<\/li>\n<li>Ransomware-GNY!DC645F572D1F<\/li>\n<li>RDN\/Generic Downloader.x<\/li>\n<li>RDN\/Generic.ole<\/li>\n<\/ul>\n<h2><\/h2>\n<h3>IOCs<\/h3>\n<p>e1200cb52d52855abfbc0c2dddefdf737fe187a8<\/p>\n<p>b4380cc94fa7319877c381f76c260fcc4e3a7078<\/p>\n<p>3aa1a0fa9db50294873335144b42562af23d7b27<\/p>\n<p>7e1dc07f454cc615e36830a29e82694934840af0<\/p>\n<p>bd430b7387f38c7126cd6e69fa638b437101f7de<\/p>\n<p>49b86dd0a20e9a1c6ed5fd310507f4c3fe3930e0<\/p>\n<p>86e72cfefde89c074f7ea5593818bc70e836ea4a<\/p>\n<p>dc92d7fe3638632819b5895a7be9d474cfc90bd7<\/p>\n<p>b11898dec3bcb95e0e152e938896be59ebf19544<\/p>\n<p>35a91e97fc73c15d686ad78e05eff37eee7d25d3<\/p>\n<p>2c781a50102725d42e7c61e56f336fc070f8f8d1<\/p>\n<p>5e06c80c56e080f93d16edb7c0bed4b8aea8de2b<\/p>\n<p>3d84f4091946b95ef1e9adb78b8c109925a31d32<\/p>\n<p>50c4d99bd876f843833114887da4585563dd852f<\/p>\n<p>674da4f22fcbbc28d8bb4c7f15b07a7ad3e32785<\/p>\n<p>da1237ded3073e4c2e9ac840def641a37a3d13e5<\/p>\n<p>365943cf84c05a8ff2f9b12fc1b79e4676914df0<\/p>\n<p>3396d8f3195175196ba642c1d82b431ed2d9461a<\/p>\n<p>10ce0d2f2cd0351ef6cac4b690c46b45b27652a1<\/p>\n<p>44fccc7fac106aa8ff9e4244a255de9f55023da2<\/p>\n<p>102318b5c8cd5464bfdd43c7108020e21f009c78<\/p>\n<p>19d4708a9cd411c283992adf26ddf14a0c27e924<\/p>\n<p>1e99e83d78df1bf1eeeb1d0df24a4680333c0ef7<\/p>\n<p>0920d949ace0e1259bd0e035f450f9475c9f3a05<\/p>\n<p>082e8ee73b6b1a828a299941bd1d65a259dbb71f<\/p>\n<p>82c4bb136c75ec4e3a01693f0d1a930b4bf596e0<\/p>\n<p>ecbee10531ab298a56606216d5a43078f7537c25<\/p>\n<p>7720aa6eb206e589493e440fec8690ceef9e70b5e6712a9fec9208c03cac7ff0<\/p>\n<p>35456dc5fdaf2281aad4d8f0441dcd0c715164e9d2ca6412380c2215ed2eab9c<\/p>\n<p>3e8660f0d2b5b4c1c7dfb0d92f1198b65f263d36cd9964505f3a69150a729f6f<\/p>\n<p>2ca214c271920c7261fc0009971961fa6d2ee4bd23820899f4d6e0679739bf2e<\/p>\n<p>2ef92ced4c009fc20645c5602f0b1f2ddca464365b73b62eb0b7217f422590d5<\/p>\n<p>77766f7f78e13dce382aeb4f89c13b9de12a2fa85f0a7550f4239dfe385a6fb5<\/p>\n<p>8834001d7420d8caaa20cd429130249db30c81f0c5da92a2cb2da4dee6669c87<\/p>\n<p>242f9a9cb23c87b6a5913731bce3f4e565f0393d95f2f9a78d675ef481578a61<\/p>\n<p>7db9491697847dd0a65b719b0d836aeb28dec22a9deed57aa601f23a5b32214a<\/p>\n<p>1f5d310da6f3f3a89e22fc86acb71741db56cbe85fbacc43822bec344cbe4058<\/p>\n<p>893c4f7e3d8e9dc6757becbf2f20e81ec09557fc8e6ea72353c7b8984068f145<\/p>\n<p>242198732eecc9c2d07d1db612b6084ece3a8d1d1b337554a7bef4216cbebccf<\/p>\n<p>e209d7003a5d3674ab90fd1d082266a4aaa1bee144b04371abba0c358e95fd03<\/p>\n<p>2a4ce9877a743865d6c11c13aa45da3683af223c196086984f57f3eff07cd3ea<\/p>\n<p>0d72eab82635df496d20a8fb3921e33ed3aac597496cf006322eed48deb2c068<\/p>\n<p>a6d23f11692e23a6c2307b9f5dd660bca3423f2f0202aa398325345f906b07b5<\/p>\n<p>079d555a4935a6748d92e8bd9856ae11ecf4fd5293ed41cf318a407f9aaa6b2d<\/p>\n<p>387be2e56804ed02ed6d4611d82c6f4b88953761d3961a33017adfb274e6cbfa<\/p>\n<p>3e1d8a5faaa35e7f72ecad5f91644efd5bf0d92fdb0341c48a236c843c697196<\/p>\n<p>0c42641fcc805c049883b9617082a8ac6d538fd87cfa371e3fef6114aff71c2a<\/p>\n<p>b31d3de8ffd2b2dce2b570c0172f87a6719f01d4424a7a375bbb249cd15c1157<\/p>\n<p>23b949ed81925ea3c10fa6c74b0d066172409e6a38023bd24672cc4efb47dd64<\/p>\n<p>6987933482f12f0e1301bb0509a46f5889802fe481be160da9a29985acbabbd9<\/p>\n<p>77d5586bc259e944634cff99912779fabfb356f6f840ea5afd6514f52562879d<\/p>\n<p>177e91b5ac698542b5488a95a60816347fcba118f0ad43473aa7d2d5c9223847<\/p>\n<p>0ffeb5639da6e77dfb241f1648fa8f9bac305335f7176def2b17e1b08706d49a<\/p>\n<p>ad7eebdf328c7fd273b278b0ec95cb93bb3428d52f5ff3b69522f1f0b7e3e9a1<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]tor2web[.]xyz\/d[.]php<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]sh\/d[.]php<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]ws\/d[.]php<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]tor2web[.]xyz\/k[.]php<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]ws\/k[.]php<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]darknet[.]to\/d[.]php<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]sh\/k[.]php<\/p>\n<p>hxxp:\/\/hcwyo5rfapkytajg[.]onion[.]pet\/k[.]php<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]darknet[.]to\/k[.]php<\/p>\n<p>hxxp:\/\/hcwyo5rfapkytajg[.]onion[.]pet\/d[.]php<\/p>\n<p>hcwyo5rfapkytajg[.]darknet[.]to<\/p>\n<p>hcwyo5rfapkytajg[.]onion[.]sh<\/p>\n<p>hcwyo5rfapkytajg[.]onion[.]ws<\/p>\n<p>hcwyo5rfapkytajg[.]tor2web[.]xyz<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]sh\/3agpke31mk[.]exe<\/p>\n<p>hxxp:\/\/hcwyo5rfapkytajg[.]onion[.]pet\/2hq68vxr3f[.]exe<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]sh\/info_bsv_2019[.]docm<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]ws\/3agpke31mk[.]exe<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]darknet[.]to\/2hq68vxr3f[.]exe<\/p>\n<p>hxxp:\/\/hcwyo5rfapkytajg[.]onion[.]pet\/info_project_bsv_2019[.]docm<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]ws\/info_bsv_2019[.]docm<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]tor2web[.]xyz\/3agpke31mk[.]exe<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]tor2web[.]xyz\/info_bsv_2019[.]docm<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]sh\/2hq68vxr3f[.]exe<\/p>\n<p>hxxp:\/\/hcwyo5rfapkytajg[.]onion[.]pet\/info_bsv_2019[.]docm<\/p>\n<p>hxxp:\/\/hcwyo5rfapkytajg[.]onion[.]pet\/3agpke31mk[.]exe<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]darknet[.]to\/info_bsv_2019[.]docm<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]tor2web[.]xyz\/2hq68vxr3f[.]exe<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]onion[.]ws\/2hq68vxr3f[.]exe<\/p>\n<p>hxxps:\/\/hcwyo5rfapkytajg[.]darknet[.]to\/3agpke31mk[.]exe<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made&#8230;<\/p>\n","protected":false},"author":1170,"featured_media":96719,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[6327],"class_list":["post-97708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Analysis of LooCipher, a New Ransomware Family Observed This Year | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made using ransomware and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysis of LooCipher, a New Ransomware Family Observed This Year | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made using ransomware and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-05T15:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-05T13:03:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ATR Operational Intelligence Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ATR Operational Intelligence Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/\"},\"author\":{\"name\":\"ATR Operational Intelligence Team\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f\"},\"headline\":\"Analysis of LooCipher, a New Ransomware Family Observed This Year\",\"datePublished\":\"2019-12-05T15:00:19+00:00\",\"dateModified\":\"2024-07-05T13:03:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/\"},\"wordCount\":1993,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/\",\"name\":\"Analysis of LooCipher, a New Ransomware Family Observed This Year | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\",\"datePublished\":\"2019-12-05T15:00:19+00:00\",\"dateModified\":\"2024-07-05T13:03:28+00:00\",\"description\":\"Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made using ransomware and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Analysis of LooCipher, a New Ransomware Family Observed This Year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f\",\"name\":\"ATR Operational Intelligence Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/a7a29f6cfb004e05c7ac7a98652288d8\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png\",\"caption\":\"ATR Operational Intelligence Team\"},\"description\":\"McAfee\u2019s Advanced Threat Research Operational Intelligence team operates globally around the clock, keeping watch of the latest cyber campaigns and actively tracking the most impactful cyber threats.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/atr-operational-intelligence-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis of LooCipher, a New Ransomware Family Observed This Year | McAfee Blog","description":"Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made using ransomware and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Analysis of LooCipher, a New Ransomware Family Observed This Year | McAfee Blog","og_description":"Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made using ransomware and","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-12-05T15:00:19+00:00","article_modified_time":"2024-07-05T13:03:28+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","type":"image\/jpeg"}],"author":"ATR Operational Intelligence Team","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"ATR Operational Intelligence Team","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/"},"author":{"name":"ATR Operational Intelligence Team","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f"},"headline":"Analysis of LooCipher, a New Ransomware Family Observed This Year","datePublished":"2019-12-05T15:00:19+00:00","dateModified":"2024-07-05T13:03:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/"},"wordCount":1993,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/","name":"Analysis of LooCipher, a New Ransomware Family Observed This Year | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","datePublished":"2019-12-05T15:00:19+00:00","dateModified":"2024-07-05T13:03:28+00:00","description":"Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made using ransomware and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analysis-of-loocipher-a-new-ransomware-family-observed-this-year\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Analysis of LooCipher, a New Ransomware Family Observed This Year"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/668134594f276e8743322ec163337c6f","name":"ATR Operational Intelligence Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/a7a29f6cfb004e05c7ac7a98652288d8","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee-Advanced-Threat-Research-CTF-docx-1-96x96.png","caption":"ATR Operational Intelligence Team"},"description":"McAfee\u2019s Advanced Threat Research Operational Intelligence team operates globally around the clock, keeping watch of the latest cyber campaigns and actively tracking the most impactful cyber threats.","url":"https:\/\/www.mcafee.com\/blogs\/author\/atr-operational-intelligence-team\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1170"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=97708"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97708\/revisions"}],"predecessor-version":[{"id":196081,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97708\/revisions\/196081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96719"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=97708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=97708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=97708"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=97708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}