Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

Petya ransomware attack: What it is, and why this is happening again

Just six weeks on from WannaCry, the world has fallen victim to another fast-spreading ransomware in the form of Petya/GoldenEye.
Why haven't lessons been learned?

Petya ransomware attack: What it is, and why this is happening again

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Android Malware Steals Personal Data, Threatens to Leak It Online Unless You Pay  (Read 13 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 22355
  • .: Surf Queen
    • WWW
Android Malware Steals Personal Data, Threatens to Leak It Online Unless You Pay
12 July 2017, 10:52 am

Another day, another form of malware targeting Android. This time, security company McAfee warns that LeakerLocker is a new type of mobile ransomware that goes after devices running Android using nothing else than applications published in the Google Play Store.

This means it’s not at all difficult to get your device infected, and statistics published in the Google Play Store reveal that thousands of users have already downloaded the compromised apps.

Basically, this ransomware is not encrypting files on the device, but only locking down the phone to steal user data in the background, including email address, contacts, browsing history, text messages and calls, device information, and even take photos with the camera.

The malware then demands the user to pay a ransom or have the data leaked online and submitted to everyone in the contact list
Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle