LockCrypt targets unsecured Windows enterprise servers via Remote Desktop Protocol (RDP) brute-force attacks. This ransomware was first documented in June 2017 and has infected machines throughout the United States, United Kingdom, South Africa, India, and the Philippines. LockCrypt is linked to the Satan RaaS (Ransomware-as-a-Service) through a common email address used in both attacks. Once a server is compromised, hackers connect to as many machines as possible and manually launch the LockCrypt ransomware on each one. LockCrypt leverages strong encryption, gains boot persistence, deletes shadow volume copies, and executes a batch file that kills all non-Windows core processes. Once encrypted, the ransomware appends .lock to the names of files and drops a ransom note named ReadMe.TxT onto the infected system. LockCrypt also provides a visual warning to users which directs them to the newly created ransom note. LockCrypt demands payment from victims ranging from 0.5 to 1 Bitcoin per server. The following email addresses are associated with the LockCrypt ransomware: jekr@aol.com, stnsatan@aol.com, Satan-Stn@bitmessage.ch, enigmax_x@aol.com, djekr@aol.com, jajanielse@aol.com, jajanielse@bitmessage.ch, d_dukens@aol.com, d_dukens@aol.com.

  • Bleeping Computer provides more information about LockCrypt here.
  • The NJCCIC is not currently aware of any free decryption tool available for LockCrypt.