LoveLock is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on February 1, 2017, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Love2Lock.
Quick Facts
Ransomware Family
LoveLock
First Seen
February 1, 2017
Known Aliases
Love2Lock
How LoveLock Ransomware Works
Targeted Files
Requires C&C (can be launched with FakeNetNG)
Encrypts test2 folder on the Desktop
Ransom note also in the test2 folder
File Encryption Patterns
LoveLock modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..hasp
Ransom Note and Payment Demands
After encrypting files, LoveLock displays ransom notes demanding payment for file recovery:
fileReadME!.txt
Ransom message:
notes/ReadME!.txt
Technical Indicators
Associated Executable Files
The following executable files are associated with LoveLock ransomware:
ccvv.exe
fdfd.exe
Elastio Can Help You
Don't let LoveLock ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
This LoveLock ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like LoveLock.