Locky, a new family of ransomware that emerged in the last few weeks, has quickly made a mark for itself.
Computer security companies say it has become a commonly seen type of ransomware, which is used to hold a computer’s files hostage pending a ransom payment.
Trustwave's SpiderLabs said on Wednesday that 18 percent of the 4 million spam messages it collected in the last week were ransomware-related, including many linked to Locky.
Locky is distributed through spam messages that have been sent through the same botnet used to send Dridex, the infamous online banking malware.
Security vendor Fortinet studied statistics collected by its Intrusion Prevention System software between Feb. 17 and March 2. The software detects when ransomware connects to command-and-control servers used by cybercriminals to manage the malware.
It found that about 16.4 percent of 18 million communications it detected were for Locky infections, with the rest belonging to CryptoWall and TeslaCrypt, the other top ransomware families.
"As predicted, Locky already covers a big chunk of the infections," wrote Roland Dela Paz, senior antivirus analyst with Fortinet.
Most of the Locky infections appear to be in the U.S., France and Japan, he wrote.
The FBI has warned that ransomware has become one of the biggest threats to consumers and businesses. Although some ransomware writers made mistakes in their code early on, there's usually no way to recover the files if the decryption key is not released.
The ransom is usually a few hundred dollars, with detailed instructions displayed to victims for how to pay in bitcoin. Security experts generally recommend backing up files to recover from a ransomware attack and ensuring the backup drive can't be reached by malware.