Something that we will need to get used to and the solution is simple , MAKE BACKUPS.
According to the article:-
“Android/Simplocker.A will scan the SD card for files with any of the following image, document or video extensions: jpeg, jpg, png, bmp, gif, pdf, doc, docx, txt, avi, mkv, 3gp, mp4 and encrypt them using AES [the Advanced Encryption Standard],”
The malware will then display a ransom message in Russian asking for a payment of 260 Ukrainian Hryvnia (around US$21.40) to be made through a service called MoneX
The new threat masquerades as an application called “Sex xionix,” but it wasn’t found on Google Play and its distribution so far is most likely low.
Another interesting aspect of Simplock.A is that it uses a .onion command-and-control (C&C) domain address. The .onion pseudo-top-level domain is only used inside the Tor anonymity network for accessing so-called hidden services.
The link below has more information:-
No comments:
Post a Comment