ESET analyzes first Android file-encrypting, TOR-enabled ransomware
Jump to navigation
Jump to search
(Publication) Google search: [1]
ESET analyzes first Android file-encrypting, TOR-enabled ransomware | |
---|---|
Botnet | Simplocker |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2014 / 2014-06-04 |
Editor/Conference | ESET |
Link | http://www.welivesecurity.com/2014/06/04/simplocker/ (Archive copy) |
Author | Robert Lipovsky |
Type | Blogpost |
Abstract
“ That, however, changed with the most recent discovery, last weekend. This Android trojan, detected by ESET as Android/Simplocker, after setting foot on an Android device, scans the SD card for certain file types, encrypts them, and demands a ransom in order to decrypt the files. Let’s look at the malware in greater detail.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2014BFR1385, editor = {ESET}, author = {Robert Lipovsky}, title = {ESET analyzes first Android file-encrypting, TOR-enabled ransomware}, date = {04}, month = Jun, year = {2014}, howpublished = {\url{http://www.welivesecurity.com/2014/06/04/simplocker/}}, }