Researchers say in a 30-day period cybercriminals behind the Locky ransomware have updated the malware three times and stepped up spam campaigns. The latest variant of the malware is called Ykcol (that s Locky spelled backwards) and was part of a Sept. 19 spam blast targeting 3 million inboxes within a three-hour period. The campaign dovetails recent campaigns that pushed out Locky variants Luky and Diablo during the same time period between Aug. 14 and Sept. 21.
Source: https://threatpost.com/locky-gets-updated-to-ykcol-part-of-rapid-fire-spam-campaigns/128412/

