123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Technology,-Gadget-and-Science >> View Article

New Ransomware Encrypts Your Android And Then Changes Pin Lock

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Security researchers from ESET have discovered a new Android ransomware that not just encrypts users’ data, but also locks them out of their devices by changing lock screen PIN. DoubleLocker is the first-ever ransomware to misuse Android accessibility — a feature that provides users alternative ways to interact with their smartphone devices, and mainly misused by Android banking Trojans to steal banking credentials.
“Given its banking malware roots, DoubleLocker may well be turned into what could be called ransom-bankers,” said Lukáš Štefanko, the malware researcher at ESET.

“Two-stage malware that first tries to wipe your bank or PayPal account and subsequently locks your device and data to request a ransom.”

The DoubleLocker hack is a threat to any Android device; it’s particularly worrying since it doesn’t require a “rooted” phone that gives extra access for the hacker to run its own code, but the effect is severe — locking the user completely out of their own device.
The ransomware is distributed through fake Adobe Flash Player downloads shared on compromised websites and ...
... it installs itself once you give it accessibility access through the “Google Play Service.” After obtaining this accessibility permission, the malware abuses it to gain device’s administrator rights and sets itself as a default home application (the launcher) — all without the user’s knowledge.
“Setting itself as a default home app — a launcher — is a trick that improves the malware’s persistence,” explains Štefanko.

“Whenever the user clicks on the home button, the ransomware gets activated, and the device gets locked again. Thanks to using the accessibility service, the user does not know that they launch malware by hitting Home.”

Once executed, DoubleLocker first changes the device PIN to a random value that neither attacker knows nor stored anywhere and meanwhile the malware encrypts all the files using AES encryption algorithm. You’ll know your files are infected if you see a “.cryeye” extension at the end of the file.

DoubleLocker ransomware demands 0.0130 BTC (approximately ₹ 4828.68 /- at time of writing) and threatens victims to pay the ransom within 24 hours.
If the ransom is paid, the attacker provides the decryption key to unlock the files and remotely resets the PIN to unlock the victim’s device.
How To Protect Yourself From DoubleLocker Ransomware
According to the researchers, so far there is no way to unlock encrypted files, though, for non-rooted devices, users can factory-reset their phone to unlock the phone and get rid of the DoubleLocker ransomware. However, for rooted Android devices with debugging mode enabled, victims can use Android Debug Bridge (ADB) tool to reset PIN without formatting their phones. The best way to protect yourself from avoiding falling victims to such ransomware attacks is to always download apps from trusted sources, like Google play Store, and stick to verified developers. Also, never click on links provided in SMS or emails. Even if the email looks legit, go directly to the website of origin and verify any possible updates. Moreover, most importantly, keep a good antivirus app on your smartphone that can detect and block such malware before it can infect your device, and always keep it and other apps up-to-date.
Found it Interesting? Got Something to ask?? Feel free to comment it below. Stay Secure ! Stay Happy !! For more CyberSec Blogs :- CLICK HERE

It is said that “Knowledge is Power” and Wisemonkeys(https://wisemonkeys.info/) is the ideal platform to prove this right where this blog was posted. Additionally, when knowledge is free it should be shared. Therefore, keeping this in mind Wisemonkeys an LMS platform is developed so that people can exchange their ideas, knowledge and experiences for the wise Gen z.

SIGN UP(https://me.wisemonkeys.info/login) TODAY and upgrade your knowledge base.

Total Views: 128Word Count: 603See All articles From Author

Add Comment

Technology, Gadget and Science Articles

1. Unleash The Power Of Ai: Sketch To Image Generator
Author: AI sketch to image generator

2. Crafting User-centric Websites: Best Practices From Kolkata's Web Development Industry
Author: webredas

3. The Essential Role Of Translation In Global Migration Policies
Author: translationbirmingham

4. Doing Agile Vs Being Agile: A Comprehensive Guide
Author: Sanaya

5. Breaking Language Barriers: Translation Services Making Waves In Birmingham
Author: premiumlinguisticservices

6. Using The Power Of Grocery Delivery App Scraping To Revolutionize Convenience
Author: Productdatascrape

7. The Best Employee Scheduling Software For Small Business
Author: Manoj Sharma

8. How To Achieve Successful Odoo Implementation For Business
Author: Kuldeep Singh Tomar

9. Ensure Positive Customer Service With Virtual Receptionists
Author: Eliza Garran

10. The Role Of Market Research Analysts: From Data To Decisions
Author: Paul Henry

11. A Detailed Guide To Fiber Polishing Parameters
Author: Ryan

12. Ultimate Guide To Choosing The Right Mobile App Builder
Author: boonapps

13. Closing The Distance: Getting To Know The Modbus Gateway
Author: Elastel

14. Managing Remote Teams Effectively With Zoho People
Author: abloom

15. What Impact Does Implementing The Six Pillars Of Digital Shelf Success Have On Cpg Sales?
Author: Productdatascrape

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: