Ransomware malware, which has until now been targeting computers, is now attacking mobile phones.

According to Ruchna Nigam, Security Researcher, FortiGuard Labs, the malware restricts the usage of the device it infects, demanding a ransome from the end-user to regain control over the device. “The malware can either damage/encrypt the system and the files on it or simply act like it performs these functions. Eitherway, the usage of the device becomes difficult for the user,” the researcher explained.

Recapping instances of ransomware on mobile phone, Nigam said 'FakeDefend was discovered in July last. It targeted Android phones, prompting the end-user to pay full subscription for the antivirus after performing a fake scan and showing a list of hard-coded infections on the phone. Whether the user pays for the antivirus or not, phone usage after infection turned out to be impossible after 6 hours”.

“Cryptolocker for mobile is more recent. It was discovered in May this year. Though the malware did not cause damage to the phone data, it displayed a locked screen claiming to originate from the local police, customised to the geo-location of the end-user.”

“iCloud Óleg Pliss' ransomware could not be attributed to a particular piece of malware but to compromised iCloud accounts. The attackers were believed to have exploited Apple's Find My iPhone, iPad and Mac features along with recycled passwords leaked from password breaches. But if the device had a passcode (phone lock), the attack did not work.”

“And finally, Simplocker, discovered last month, is doing the rounds now. To avoid any of these infections, users should set a passcode on their device; it is always advisable to install applications from trusted sources and developers and have a functional antivirus that would generally prevent or at least warn against installation of infected applications,” the researcher said.

comment COMMENT NOW