Ransomware for Android is starting to look more like ransomware for Windows, thus showing a newly discovered variant. This variant poses as a pornographic app. Once installed makes the ransomware quietly a photograph of the victim and then displays a message with the photo.
In the message to the country of the user, IP address, service provider and device data published as well as a warning stating that a crime has been committed. To restore access to the device must be a “fine” of $ 500 to be paid. The ransomware remains active even after restarting the phone, and ensures that the device is no longer usable.
Making the picture is a trick that was previously used by Windows ransomware. Possibly this would persuade victims to pay the amount requested earlier. To make the picture the Android ransomware first checks if there is a front camera is present. The Android ransomware is not unique in making photographs. Earlier it was discovered another copy that does this.
Users must start the machine in Safe Mode In the event of an infection. Then must be removed from the app administrator rights first, after which the app can be uninstalled. Prevention is wiser, so advises analyst Shivang Desai of Zscaler Labs. The app is in fact beyond official app stores offered. Desai suggests Android users also to use only reliable app stores such as Google Play.
No comments:
Post a Comment