Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 31 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

File-encrypting Android ransomware detected

by The Gurus
June 4, 2014
in Editor's News
Share on FacebookShare on Twitter

Mobile ransomware which locks down Android devices has been detected.
 
According to research by ESET, the file encrypting malware has been named Simplocker and scans the SD card for certain file types, encrypts them and demands a ransom in order to decrypt the files. ESET explained that after it is downloaded and launched, it displays a message in Russian and encrypts files in a separate thread in the background.
 
It instructs the victim that the device is “locked for viewing and distribution of child pornography, zoophilia and other perversions” and the user has to pay 260 Ukranian Hryvnia (£13). After payment is received, the device will be unlocked within 24 hours. If payment is not received, the user is told that all data on the device will be lost.
 
According to the blog by ESET malware researcher and security intelligence team lead Robert Lipovsky, the command and control server is hosted on a TOR .onion domain for purposes of protection and anonymity. “Instead, the malware listens to its C&C server for a command – probably issued after payment is received – to decrypt the files,” he said. “The sample we’ve analyzed is in the form of an application called ‘Sex xionix’. It was not found on the official Google Play and we estimate that its prevalence is very low at this time.”
 
Analysis by ESET suspected that the Russian-language ransomware is currently in a proof-of-concept stage or is a work in progress, but warned that the malware is fully capable of encrypting the user’s files.
 
Commenting, Michael Sutton vice president of security research at Zscaler, said that the success of ransomware on the PC, such as CryptoLocker, meant it was inevitable that ransomware would move to the mobile space. “Just last month we saw the emergence of Koler on Android, which attempted to lock the user’s device and demand a ransom,” he said. “This Trojan goes a step further by actually encrypting certain files. Fortunately, mobile devices are more restrictive in permitting application access to the file system and as a result, this Trojan is limited to encrypting only those files on an installed SD card.”
 
He suspected that ransomware will continue to evolve in the mobile space, given the financial success that it has achieved in the PC realm. “Users should ensure that regular and continual backups of device applications and data are available. This way, should ransomware ever be installed, they will always be able to recover the phone content.”

FacebookTweetLinkedIn
Tags: AndroidmobileRansomwareTOR
ShareTweetShare
Previous Post

Could small businesses face an advice shortage over botnet takedown?

Next Post

Queen's speech seeks to issue harsher sentences in Computer Misuse Act amendment

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information