• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Top 3 Android Ransomware

July 9, 2018Simeon Georgiev

Android’s ecosystem has been one of the favorite targets by a cybercriminal. As billions of Android phones are used all over the world, cybercriminals find it easy to attack people through their Android mobiles. Some of the most popular Android ransomwares are the following:

Lockdroid

Lockdroid has posed as a reliable looking ransomware by using Google’s Material Design. The app disguises itself as an update of Google, enticing users to install it by showing a screen filled with permissions by which attackers can access your entire mobile. Users click on the app to install without reading the permissions and allow the ransomware authorization to infect the computer.

Afterwards, the ransomware manages to control the complete phone including texts, call logs and browser information. The ransomware then poses as a security agency and users are shown a warning that warns them about an illegal activity that they have committed and the payment of a fine as penalty. Users then pay the fine to remove ransomware.

Adult Player

Adult Player tries to cash on the psychology of its victims by posing as a porn video player. It then proceeds to show videos to users and completely deceives them into thinking of it as a real app. As the user watches videos, the app takes snaps of its victims through the front camera.

Users are then threatened with the leak of these pictures to public in return of money (ransom). Adult Player then manages to completely lock the device. The ransom demanded is generally $400-600 and the payment medium required is PayPal.  Many people pay ransom in order to save their reputation and remove ransomware.

Simplocker

Simplocker was the first Android ransomware and its origins trace to Russia. It was first discovered by ransomware removal experts in 2014. The ransomware employs the use of the popular AES (Advanced Encryption Standard) for encrypting the files of their victims. Users are fooled into thinking that they have been caught by a security agency breaking the law while committing a crime like child pornography.  Thus, users are confused and pay immediately to save themselves and remove ransomware.

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post What is CYBER SSCPT Ransomware Next post FBI Cautions against Ransomware Attacks

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.