sb-as logo
Story image

Google committed to keeping ransomware away from Android

09 May 2017

Have you ever wondered how Google protects Android and Google Play from malware and ransomware? It turns out that ransomware - on Android at least - is rare, but it does strike.

Jason Woloz, senior program manager of Android Security released a blog in March, in which it showed how ransomware strikes, what it does and why Android Nougat users are supposedly safe.

Woloz says that since 2015, fewer than 0.00001% of apps on the Google Play store and less than .01% of apps elsewhere were ransomware. While those statistics may seems small, ransomware does get through.

When ransomware strikes Android, it either restricts access to the device and then demands payment to regain access; or encrypts the external storage and then demands payment to decrypt that data.

Woloz says that Android's ‘Verify Apps’ system analyses all apps before they are installed. It also checks more than 400 devices and 6 billion apps every day for anything that looks suspicious.

It also uses ‘Application Sandboxing’ to make each app run independently. 

They also “require apps to mutually consent to sharing data, a protection which limits ransomware’s ability to access sensitive information like a contact list from another app,” Google says.

Woloz claims that Android 7.0 Nougat has better ransomware defences, including safety blinders that stop apps from seeing what others are doing; better lockscreen defences so ransomware can’t lock users out; and better protection against ‘clickjacking’.

The best protection is prevention, however. Google recommends that users download apps from trustworthy sources; install the Verify Apps software is installed; use security solutions; back up device contents; and exercise caution.

But latest protection aside, what do you do if you’ve installed ransomware? Google offers the following tips:

Boot into safe mode. If an app is acting strangely in normal mode but acts fine in safe mode, the issue lies with a third party app. Use safe mode to uninstall the app and then reboot the device.

If that doesn’t work, Google suggests resetting the device to factory settings, also known as a hard reset or device format. This allows you to remove dangerous apps.

“This should be your last resort, but if you’ve backed up your files, resetting your device should be easy. Check with your carrier or device manufacturer for instructions on how to reset your phone,” Woloz says.

Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
UiPath and eSentire bring hyperautomation to Microsoft Security
UiPath and eSentire have announced a strategic partnership to deliver end-to-end security policy automation across multiple Microsoft Security services.More
Story image
Lumen upgrades DDoS mitigation service as attack volumes climb
In April and May 2020, the company observed 929,000 attacks - the highest number of attacks ever seen in a 31-day period.More
Story image
How to secure your business against DDoS Attacks
With the upward trend of DDoS attacks this year, and an increased dependency on online channels across all industries, businesses need to be prepared, so they don’t suffer any disruption. More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Story image
Women in cybersecurity – what is holding us back?
A robust and diverse workforce with wide-ranging skills and depth of experience is essential for providing balance, safety and continuity to both the industry and countries at large. More