Added: Auburn Lawlor - Date: 02.12.2021 04:37 - Views: 45291 - Clicks: 4135
A new ransomware threat has hit users of Android smartphones, and this one comes with a twist: it uses SMS text messages to spread. Text messages concerning a sex simulator game that is using your photo. Some media reports may tell you that the ransomware threat is dead in the water these days but try telling that to the city of Baltimore or the Governor of Louisiana. Try telling that to Android users who have received a text message about their appearance in a sex simulator game, from one of their friends or family members. Lukas Stefanko, a malware family sex simulator at cybersecurity vendor ESET, has uncovered a new ransomware family in the wild.
C by the ESET mobile security team, this particular piece of ransomware uses the contact lists of victims to spread further via SMS text message complete with malicious links. Seen in the wild, that is being active out there in the real world as opposed to just cyber research labs, since July 12, the ransomware uses an initial infection vector of online forums such as Reddit and the XDA Android developer forum.
It then spre further by sending malicious SMS text messages to all the contacts on an infected Android smartphone, after which it encrypts the majority of user files on that device and demands a ransom. A ransom, as ESET researchers point out, it is unlikely to get as "it is possible to decrypt the affected files without any assistance from the attacker. ESET found that most of the postings to Reddit forums were porn-related, or comments to porn-related thre.
The attackers also used technical topics as a lure, hence the use of the XDA developer forum as an attack vector. All the posts shared one thing in common: they contained links or QR codes pointing to malicious apps. The SMS text messages that were sent once an Android smartphone was infected by the ransomware, which has 42 different language templates to cover most options, warned the users' friends and family by name that their photos were being used in a "sex simulator game" and provided a link to the app concerned.
That app, of course, is the ransomware itself and comes disguised as the sex simulator game in question. Behind the family sex simulator, it acts as a command and control center, spreading more malicious text messages and encrypting user files. That encryption is flawed, however, and ESET describes how data can be decrypted without paying any ransom. Moore admits that when this is sent from a contact in your contact list, it can be harder not to trust what they are saying.
And ethical hacker, John Opdenakker, is quick to point out that ransomware is, indeed, still a very prevalent threat. The fact that this ransomware is distributed via SMS, using the contact list of the victim, "makes it a dangerous one," Opdenakker continues, "it can spread fast, and people are more likely tricked in downloading the malicious app when the link comes from someone they trust.
If you ask most people, at least in my experience, they don't think of text messages as a threat vector. At least not in terms other than someone may be trying to defraud them by pretending to be someone or something they are not. Which is precisely how malware, including ransomware works; so why the apparent disconnect? Davey is a three-decade veteran technology journalist and has been a contributing editor at PC Pro magazine since the first issue in A co-founder of the Forbes.
Contact me in confidence at davey happygeek. This is a BETA experience. You may opt-out by clicking here.
Jul 22,am EDT. Jul 21,pm EDT. Jul 21,am EDT. Edit Story. Jul 30,am EDT. Businessman paying a ransom to on a tablet device Getty.
Follow me on Twitter or LinkedIn. Check out my website or some of my other work here. Davey Winder. A co-founder of the Forbes …. Read Less.Family sex simulator
email: [email protected] - phone:(790) 553-8169 x 4398
Can You Handle Banging Your Step-Sister?