Researchers have Android ransomware discovered devices for ransom locks and victims via a qr code, the requested amount pay late. The problem is that users of the qr code using the infected device can scan.
The malicious Android app is spread via unofficial app stores, misleading sms text messages and forumpostings, according to security company Symantec. Once installed look for the malicious app, or the Android device is rooted. If this is the case is ask the app to have root privileges, which supposedly would be needed to allow the user access to thousands of pornofilmpjes.
If the user gives permission to change the app to his rights and ensures that if system application is started. After that, the screen is locked. In the event the device is not rooted the app will the unit immediately lock. The ransomware will not continue in the system nesting. The victims pay makes the ransomware using a qr code on the locked screen is displayed.
“This might seem like a good idea for victims in this way, the ransom for their device to pay, in practice it is not really effective. It is not possible to get the qr code from the infected device to scan, so there is a second device,” says Dinesh Venkatesan of Symantec. Android users get the advice to only apps from trusted locations to download, set the permissions to check which apps questions and updates for their device to install.
No comments:
Post a Comment