Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Lockdroid Ransomware couldn’t Taint a Single Android Device


Just when February 2016 started, Symantec issued an alert regarding Android.Lockdroid.E a ransomware that according to the security company could then impact 67% of Android operators, besides some more already present Android ransomware.

By leveraging a previous UI feature, the current ransomware version could let its creator display one secondary overplay over and above the target device's frontal screen, which needed administrative rights for the application which Lockdroid ransomware contaminated. Softpedia posted this dated February 15, 2016.

Moreover, on pressing a button which was labeled "Continue" -the button appeared on the first cover overplay- credulous victims actually pressed "Activate" button, an attack form called 'Clickjacking.' While pretending to be a pornography application known as "Porn 'O' Mania," the ransomware, however, actually aimed at compromising the device. Initially it'd attempt at accessing details of the device using one screen which hid activation dialog of the system. On top of this dialog would be one bogus window, reading "Package Installation."

And as per reports from IT PRO, Google's Senior Security Analyst Elena Kovakina speaking at Tenerife, Spain held Security Analyst Summit by Kaspersky told attendees that not even a single owner of Android was so effectively duped that he downloaded Lockdroid.

Kovakina explained the phenomenon took place as Google's security systems would've raised alarm about the ransomware via the Verify Apps tool of Google. The tool functioned to scrutinize each and every app present inside Google's PlayStore as well as the maximum possible apps side-loaded via other application stockpiles. Kovakina stated that fewer than a thousand gadgets downloaded the malevolent applications containing the Lockdroid malware as also that according to the analytics by Google, no device owner really loaded it.

Incidentally, Verify Apps scrutinizes devices to detect in them ransomware, rooting operations, phishing, harmful websites, spywares, backdoors, call fraud, WAP fraud, SMS fraud, and more such familiar attack scenarios and mediums. This security mechanism begins action at the time applications are loaded from unsubstantiated sources as also they would then be disabled. Verify Apps is automatically turned on in all devices, so within the present instance, apparently it may've aided foil one dangerous ransomware attack.

» SPAMfighter News - 24-02-2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next