Difference between revisions of "ESET analyzes first Android file-encrypting, TOR-enabled ransomware"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
m (Text replacement - "/ www." to "/ |Site=www.")
 
Line 1: Line 1:
{{Publication
{{Publication
|Type=Blogpost
|Type=Blogpost
|Link=http://www.welivesecurity.com/2014/06/04/simplocker/ www.welivesecurity.com
|Link=http://www.welivesecurity.com/2014/06/04/simplocker/
|Site=www.welivesecurity.com
|Author=Robert Lipovsky
|Author=Robert Lipovsky
|NomRevue=We Live Security
|NomRevue=We Live Security

Latest revision as of 12:51, 31 July 2015

(Publication) Google search: [1]

ESET analyzes first Android file-encrypting, TOR-enabled ransomware
Botnet Simplocker
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2014 / 2014-06-04
Editor/Conference ESET
Link http://www.welivesecurity.com/2014/06/04/simplocker/ (Archive copy)
Author Robert Lipovsky
Type Blogpost

Abstract

That, however, changed with the most recent discovery, last weekend. This Android trojan, detected by ESET as Android/Simplocker, after setting foot on an Android device, scans the SD card for certain file types, encrypts them, and demands a ransom in order to decrypt the files. Let’s look at the malware in greater detail.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1385,
   editor = {ESET},
   author = {Robert Lipovsky},
   title = {ESET analyzes first Android file-encrypting, TOR-enabled ransomware},
   date = {04},
   month = Jun,
   year = {2014},
   howpublished = {\url{http://www.welivesecurity.com/2014/06/04/simplocker/}},
 }