sb-as logo
Story image

Fourfold increase in ransomware attacks against Android

06 Jul 2016

Android users beware, ransomware is becoming more prevalent towards your devices. Kaspersky Lab has found that the ransomware landscape has increased four times in a single year and is now claiming 136,532 global victims.

The Kaspersky Labs report shows a spike in ransomware attacks since January 2016 and points to a significant change in the mobile ransomware threat landscape. Ransomware blocks or locks access to devices and demands money to unlock files. Previously common to PC users, Android devices are now becoming targets.

Four main groups were responsible for 90% of all attacks: Small, Fusob, Pletor and Svpeng families of malicious malware. The research also found that ransomware is increasing as an attack method on all Android devices, rising from 2.04% to 4.63% over the last four years.

The study also found that Android ransomware mainly takes the form of screen-blockers as they cannot be removed with external hardware.

“The extortion model is here to stay. Mobile ransomware emerged as a follow-up to PC ransomware and it is likely that it will be followed-up with malware targeting devices that are very different to a PC or a smartphone. These could be connected devices like smart watches, smart TVs, and other smart products including home and in-car entertainment systems. There are a few proof-of-concepts for some of these devices, and the appearance of actual malware targeting smart devices is only a question of time,” says Roman Unuchek, mobile security expert at Kaspersky Lab.

The study found that although Android ransomware is still lower and growing at a slower rate than PC ransomware and more frequently targets larger countries such as the United States, Germany and the United Kingdom, it does demonstrate that criminals are exploring mobile ransomware opportunities.

Kaspersky Labs recommends:

  • Only download apps from official app stores
  • If downloading from unofficial sources, scrutinise permissions and do not download without security software
  • Using anti-malware software security able to detect malicious links and malware
  • Educate friends and family about malware propagation, which will help you detect social engineering attacks
Story image
Security and operations collaboration key to success post COVID-19
“We are in an ultra-hybrid world with multi-everything, and in order to successfully navigate this landscape, ITOps, DevOps, and SecOps teams need to more closely align."More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
Financial institutions in APAC region to invest millions in fraud prevention
"The pandemic is creating a lot of uncertainty, but the majority of FIs in APAC recognise that an end to end fraud management platform is strategic to differentiating themselves from the highly disruptive landscape they are playing in."More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More
Story image
Gartner names ThreatQuotient a representative vendor for SOAR
The company is listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response Solutions.More