Ransomware Strikes the Mobile
Ever wondered what use would be file encrypting ransomware, when your entire mobile data is backup-ed on the cloud and you can revert back all your data from a certain point! That is certainly a point well noted by the creators of these malware for the mobile.
So instead of encrypting files on the memory drive of your smartphone, they have taken to what is called as “Blockers” which essentially overlay the user interface of every app on your smartphone with their own version and effective control if the app runs or now.
There were four main types of mobile ransomware that held 99% of the market between 2014 and 2015. These are SVPENG, PLETOR, and Fusob. Of these only two remained dominant as the developers of SVPENG and PLETOR moved on to developing more lucrative malware.
What these trojans do is they display a fake screen on your mobile device attested by signatures from law enforcement authorities charging the owner with misdemeanor notifying them that if they do not pay a certain fine, criminal charges will be brought up against them.
Now if it is truly the law enforcement agencies delivering summons through your mobile is another thing and not everyone is a sophisticated user and may end up paying the fine. The curious thing is the fine is to be paid not through the traditional cash/card but by way of Kiwi payment system or the MoneyPak xpress packet vouchers or adjusted with virtual money such as iTunes Gift cards,
The majority of victims of Fusob are from Germany followed by the UK and the US where Small targets mostly users of Russia, Kazakhstan, and Ukraine. So this is still not a world wide phenomenon just yet but the number of incidents are increasing as we speak and sure to break out in other parts of the world sooner then later.
One way to avoid getting into the trap of any kind of malware is to disable the security option on your mobile settings called “unknown sources” and regularly update your device’s firmware and its installed apps.
Source: wikipedia commons