You can check the latest ransomware information.
[DarkyLock ransomware]
[Virus/malware activity reported: DarkyLock ransomware]
A security breach believed to be in the form of ransomware DarkyLock ransomware has occurred. We would like to
confirm the situation and provide a warning as follows.
Virus/malware activity target items and information
DarkyLock ransomware is a variant of LockBit Black ransomware that disguises itself as a PuTTY executable file and tricks users into performing malicious actions.
How it works
file version
This ransomware is a variant of LockBit 3.0 (commonly known as LockBit Black) and appears to be changing all files with the extension .darky. This is additional information about the file.

[Figure 1] File information

[Figure 2] File properties
behavioral process

[Figure 2] Camouflage screen during action process

[Figure 3] Startup program registry registration

[Figure 4] Ransomware internal code

[Figure 5] Reference material

[Figure 6] Mutex information
Appearance and contents after infection (ransom note)
The information file is created in each folder with the name Restore-My-Files.txt, and when encryption is performed, the files are changed to <encrypted file name.darky>.

[Figure 7] .txt file ransom note screen

[Figure 8] Ransom note image

[Figure 9] Extension changed after infection
White Defender compatible
Diagnosis
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.

[Figure 10] Malicious activity blocking message

[Figure 11] Blocking log
Watch DarkyLock blocking video
