Locky Ransomware Data Recovery

Written byHeloise Montini
Heloise Montini

Heloise Montini is a content writer whose background in journalism make her an asset when researching and writing tech content. Also, her personal aspirations in creative writing and PC gaming make her articles on data storage and data recovery accessible for a wide audience.

Edited byLaura Pompeu
Laura Pompeu

With 10 years of experience in journalism, SEO & digital marketing, Laura Pompeu uses her skills and experience to manage (and sometimes write) content focused on technology and business strategies.

Co-written byBogdan Glushko
Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

I think there's an issue with my storage device, but I'm not sure
Start a free evaluation

What is Locky Ransomware?

Locky is a type of malware that encrypts files on your computer, making them impossible to open unless you have the decryption key. This key is typically only accessible by the Locky Ransomware creators, who then demand a ransom from the victim for them to regain access to their files.

How does Locky spread?

Attackers typically spread it through phishing emails that contain attachments or links that, when clicked, will download and install the Locky Ransomware onto your computer. They can also spread this ransomware through malicious advertisements or by unknowingly visiting an infected website.

How does it work?

Once Locky is installed on your computer, it will scan your hard drive for certain types of files to encrypt. This ransomware typically targets important files, such as documents, spreadsheets, photos, and videos. Once Locky has encrypted your files, it will append the ".locky" extension to the end of each file name. For example, "MyPhoto.jpg" would become "MyPhoto.jpg.locky". Locky will then display a ransom note that instructions on how to pay the ransom and decrypt your files.

How much does it cost?

Locky Ransomware creators typically demand a ransom of between 0.5 and 2 Bitcoins. But, the price can vary depending on how quickly you contact them and pay the ransom. Attackers may also threaten to delete your encryption key if you don't pay the ransom within a certain time frame, typically 24-48 hours.

History

Locky was first discovered in February 2016 by MalwareHunterTeam. It quickly rose to become one of the most prevalent forms of ransomware, with over 25 million Locky Ransomware infections reported by June 2016. Locky has continually evolved since its inception, with new versions being released regularly.The biggest Locky Ransomware outbreak occurred in August 2016, when the ransomware was spread through a massive spam campaign that used the Necurs botnet to send out over 700,000 emails per hour. This spam campaign resulted in over 23 million Locky Ransomware infections in just two weeks.

How to avoid Locky Ransomware infections?

The best way to avoid it is to be aware of how it can spread. Be cautious of phishing emails, especially those that contain attachments or links from unknown senders. Do not click on any advertisements on websites that you are not familiar with. Keep your anti-virus software up-to-date and perform regular backups of your important files to an external hard drive or cloud storage service.

What should you do?

If attackers have infected you with Locky Ransomware, the first thing you should do is disconnect your computer from the internet to prevent the malware from encrypting any more files. Then, you can use a reputable anti-malware program to scan your computer and remove this ransomware. Even if you can remove Locky from your computer, however, your files will still be encrypted and you will need the decryption key to decrypt them. This key is only accessible by the Locky Ransomware creators, so you will need to pay the ransom to get it.We do not recommend paying the ransom, as there is no guarantee that you will receive the decryption key even if you do.Instead, you should focus on restoring your files from a backup. If you do not have a backup, you may be able to use file recovery software to recover some of your encrypted files.We built SalvageData data recovery software to help you.

Public decryption tool

Unfortunately, there is no public decryption tool available for Locky Ransomware at this time.

Contact a data recovery service

SalvageData Locky Ransomware data recovery experts can help you recover your files without paying the ransom.SalvageData is the only Locky Ransomware data recovery service with a 100% success rate. We have recovered over 1 million files from Locky Ransomware infections.We have a no data, no charge policy, which means that you will only pay us if we can successfully recover your Locky Ransomware encrypted files.To get started, please contact us and schedule a free consultation.

Share this article

Related services

These are the most commonly requested data recovery services. At our headquarters' cleanroom lab, our certified engineers conduct a thorough review of any type of physical storage device, determining if there is logical or physical damage and carefully restoring all of the lost files.ces.

External Drive Data Recovery

We recover data from both external SSD and HDD drives. Rely on certified experts to restore your important files from damaged or corrupted external drives.

/services/data-recovery/external-drive/

Hard Drive Data Recovery

Recover data from all brands of HDD, PC hard drives, and hybrid disks. Our specialists ensure fast and secure recovery for any data loss scenario.

/services/data-recovery/hard-drive/

NAS Data Recovery

Recover data from NAS devices, including RAID configurations. Our team handles all types of NAS systems and ensures data recovery with minimal downtime.

/services/data-recovery/nas/

RAID Data Recovery

Our RAID data recovery services cover RAID 0, 1, 5, 10, and other configurations. We offer expert solutions for failed, degraded, or corrupted RAID arrays.

/services/data-recovery/raid/

SAN Data Recovery

Our team specializes in handling SAN devices from leading manufacturers like Dell EMC, HP, and IBM, ensuring efficient recovery with minimal disruption to your operations.

/services/data-recovery/san/

SD Card Data Recovery

Our recovery experts specialize in restoring data from SD and memory cards. We guarantee quick recovery with a no-data, no-charge policy.

/services/data-recovery/sd-card/

SSD Data Recovery

Our data recovery experts handle all SSD data loss scenarios with advanced tools, ensuring maximum recovery with high-security protocols.

/services/data-recovery/ssd/

USB Flash Drive Data Recovery

Recover lost data from USB flash drives, regardless of the damage or brand. We offer free in-lab evaluations to assess data recovery needs.

/services/data-recovery/usb-flash-drive/

If you’re unsure about which data recovery service to choose, let our team assist you in selecting the appropriate solutions. We understand the anxiety that comes with a sudden drive failure, and we are more prompt in our actions compared to other recovery service providers.