LockLock targets Windows OS and is an EDA2-based ransomware variant. The method of distribution is currently unknown. LockLock encrypts files using AES-256 and appends .locklock to the names of encrypted files. It requests the victim contact the attacker via email or skype, at the addresses provided on the ransom note. The ransom payment demand for LockLock is currently unknown.

  • Bleeping Computer provides more information about LockLock here.
  • Victims may be able to have their files decrypted by contacting security researcher Demonslay335 on the Bleeping Computer forums here.

One example of the LockLock variant. Image Source: Bleeping Computer