A new ransomware was discovered that tries to impersonate the well known Locky ransomware. It calls itself Locky and even adds Locky to encrypted files, but on closer examination there was definitely something off. The ransom note is completely different and it does not utilize Tor for its Command & Control servers. It is unknown at this time how AutoLocky is distributed. In the article below I will outline how to decrypt your files and provide a brief technical overview of the encryption process. For those who want a list of Emsisoft’s free ransomware decryptors, you can visit their decryptor page.
Source: https://www.bleepingcomputer.com/news/security/decrypted-the-new-autolocky-ransomware-fails-to-impersonate-locky/

