Saturday, June 7, 2014

Android / Simplocker – the first virus encrypts files on the … – PCLab.pl

class=”image” src=”http://pclab.pl/zdjecia/artykuly/blind/2014/06/simplocker/wirus120.jpg”

on the market there is a new threat to attack Android devices. According to experts from the company ESET Android / Simplocker, because this malicious program was named, is the first ever application of ransomware encrypts files is and blocking access to them on mobile devices. Its effects are very harmful, because access to the data can be obtained only after paying a ransom. In the case of virus attacks users in Ukraine, but if these hackers already broke the door, it’s only a matter of time until it reaches a threat to us.

Detected by ESET pest Android / Simplocker gets on victim’s machine stitched the application and proceed to destroy the works right after the installation of the main program. Simplocker stitches deep in the files, starts to scan our SD card for a specific group of files (jpeg, jpg, png, bmp, gif, pdf, doc, docx, txt, avi, mkv, 3gp, mp4) and starts the encryption algorithm AES .

Android / Simplocker

The whole process is hidden until it is complete when the display device appears ransom. To restore access to the files, the user must pay 260 Ukrainian hryvnia. Currency is not by chance – the virus was created to attack the inhabitants of Ukraine. It should, however, be on your guard, because the translation of the following message and request of zlotys in place of the hryvnia is only a matter of time. And what happens next? Infected device connects to a server where full control is a cybercriminal, so that it can fulfill virtually every command. It is also unclear whether the longer you pay the ransom Android / Simplocker disappears from your smartphone, or just goes into hibernation. In the latter case, such charges could be drawn from the user practically all the time.

 Android / Simplocker

It is still unclear who is responsible for this attack. The connection to the server is established using the TOR network, thus making it difficult to detect exactly where packages are delivered. A cybercriminal enter into possession of the IMEI, device model, manufacturer’s name and the version of the operating system. If you do not want to pay, waiting for him to restore the data from backups. Unless, of course, made earlier backup.

Over 99% of mobile viruses are created with a view to Android

No comments:

Post a Comment