Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


Android security: Sneaky three-stage malware found in Google Play store

Tens of thousands of users have downloaded two newly uncovered forms of malware.
Another crop of Android apps hiding malware have been discovered in - and removed from - the Google Play store.

Android security: Sneaky three-stage malware found in Google Play store

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Android Users Attacked by Ransomware Mimicking WannaCry  (Read 43 times)

0 Members and 1 Guest are viewing this topic.

BarbosaTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: The High Seas
  • Posts: 536
Android Users Attacked by Ransomware Mimicking WannaCry
7 July 2017, 11:40 am

Security researchers at Trend Micro warn that Android smartphones are currently attacked by a new version of the SLocker ransomware that uses an interface similar to the one of WannaCry, the malware that infected thousands of systems in May.

The security company says that SLocker typically comes bundled into cheating tools for Android games, video players, and other popular programs, attempting to replace the wallpaper on the phone and to change its icon after compromising a device.

The ransomware doesn’t go after system files, which is a bit surprising, but instead chooses to encrypt files that have suffixes, such as text files, photos and videos that are larger than 10KB and smaller than 50MB. Once a device is infected, SLocker gives users three different options to pay, threatening to increase the ransom as more time passes since the malw... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks