ESET analyzes first Android file-encrypting, TOR-enabled ransomware

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

ESET analyzes first Android file-encrypting, TOR-enabled ransomware
Botnet Simplocker
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2014 / 2014-06-04
Editor/Conference ESET
Link http://www.welivesecurity.com/2014/06/04/simplocker/ (Archive copy)
Author Robert Lipovsky
Type Blogpost

Abstract

That, however, changed with the most recent discovery, last weekend. This Android trojan, detected by ESET as Android/Simplocker, after setting foot on an Android device, scans the SD card for certain file types, encrypts them, and demands a ransom in order to decrypt the files. Let’s look at the malware in greater detail.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1385,
   editor = {ESET},
   author = {Robert Lipovsky},
   title = {ESET analyzes first Android file-encrypting, TOR-enabled ransomware},
   date = {04},
   month = Jun,
   year = {2014},
   howpublished = {\url{http://www.welivesecurity.com/2014/06/04/simplocker/}},
 }