OMNINET PLUS Blog

OMNINET Plus has been serving the Washington D.C. metropolitan area since 1994, providing IT Support such as technical help-desk support, computer support, and consulting to small and medium-sized businesses.

Ransomware: Coming to a Mobile Device Near You

Ransomware: Coming to a Mobile Device Near You

Ransomware, the unpleasant form of malware dedicated to denying users access to their own device, has become more prominent with mobile technology. While ransomware is typically associated with desktop computers, it’s fully capable of infecting mobile devices. Therefore, it should be no surprise that cases Mobile-based ransomware have increased nearly four-fold in the past year.


According to software security group Kaspersky Lab, their customers in Germany were victimized by mobile ransomware at the highest rate worldwide, followed by Canada, the United Kingdom, and the United States. Furthermore, Kaspersky cited that it protected 35,412 mobile users from ransomware between April of 2014 and March of 2015. During the next year, that total surged upwards to a total of 136,532 users protected. Mind you, these totals aren’t factoring in the number of users who fell victim to their attacks, meaning the actual totals of mobile ransomware victims are likely much, much higher.

Much like the ransomware that attacks desktop and laptop systems, mobile ransomware infects the victim’s phone--however, rather than encrypting the data contained on the phone, which many users have backed up, ransomware on a mobile device will simply block access to apps and display a note explaining how to pay the demanded ransom.

What’s more, many of these mobile ransomwares fight dirty, even by their hacking standards. One particular ransomware originating in Ukraine locks the keys and replaces the home screen with a fraudulent FBI warning and a MoneyPak voucher code. The recipient of such ransomware is someone who (according to the warning) has broken the law by visiting illegal adult-themed websites. The ransomware shows screenshots from said websites included from the user’s browser history, and demands a $500 fine.

Besides the repulsive nature of the screenshots, the most terrifying thing is how indiscriminate these attacks are in selecting their victims. All one needs to do is click on the wrong link on their smartphone to be infected. This was proven in 2014, when a 12-year-old girl unintentionally installed some malware that locked her phone. The malware downloaded some very illegal videos, and threatened to contact the FBI if she didn’t pay $500.

So, how can you defend yourself from mobile ransomware?

  • Update software on a regular basis: Malware and software updates are in a constant race to improve upon themselves, which means that outdated software simply won’t stand up to the more advanced malware. However, if regularly updated, your software stands a much better chance in fighting off an attack.
  • Utilize a cloud-based backup: While not the ideal circumstance, if your cell phone turns out to be beyond saving (without a complete and comprehensive wipe, at least) you will be very happy that your contacts and documents are safe in the cloud.
  • Avoid questionable downloads: Simply put, if you don’t trust the source of a download, don’t download it. Otherwise, you are inviting an attack into your phone.
  • Finally, don’t be afraid to contact the authorities: For this we return to the 12-year-old girl from before, who ultimately contacted her local authorities to report the malware incident. Even if there is illegal material on your phone, law enforcement members will be able to tell that it’s a plant from ransomware.

For more tips on how to avoid threats on all of your devices, contact us at 301-869-6890.

Continue reading
0 Comments

Alert: Petya Ransomware May Be the Worst Yet

Alert: Petya Ransomware May Be the Worst Yet

Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.

Recent comment in this post
AvaSneddon
The role of mistakes is well concern by the time as well as it also may concern by the time. There are well known best research wr... Read More
Wednesday, 27 February 2019 04:22
Continue reading
1 Comment

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Hackers Hosted Solutions Best Practices Backup Internet Business Business Computing IT Services Productivity Business Continuity Google Malware Software Hardware Windows 10 Miscellaneous Mobile Device Management Disaster Recovery Microsoft Innovation Computer Mobile Computing Mobile Devices VoIP Server IT Support Efficiency Data Network Security Windows Workplace Tips Smartphone Managed Service Provider Save Money communications Virtualization Upgrade Email Office Budget Holiday Best Practice Chrome Android Employer-Employee Relationship User Tips Small Business Hacking Outsourced IT IT solutions Network Data Management Managed IT Microsoft Office Telephone Systems Application Recovery Apps BYOD VPN Information Technology Quick Tips Business Intelligence Hard Drives Disaster Gmail Going Green Operating System Bandwidth The Internet of Things Social Engineering Firewall Remote Computing Ransomware Communication Computers Saving Money Managed IT Services Automation Lithium-ion battery Wireless Technology Avoiding Downtime Smartphones Tablet Gadgets Government Office Tips Cybercrime Browser Remote Monitoring Biometrics Risk Management Network Congestion Health Passwords Humor Proactive IT BDR Unified Threat Management Cost Management Spam Facebook Password Administration DDoS Big Data WiFi Customer Service Social Alert Hosted Solution Streaming Media Telephony Phone System Mobility Private Cloud Buisness Best Available Science Reputation SaaS Tech Support Domains Customer Relationship Management Mouse Data storage Printer Business Management HaaS Internet Exlporer Shadow IT Google Drive Printer Server Social Media Colocation IT Technicians Uninterrupted Power Supply Instant Messaging Document Management Virtual Desktop Applications Wearable Technology Networking hacker Near Field Communication Phishing Internet of Things Bluetooth Save Time Maintenance WIndows 7 Laptop Running Cable Human Resources iPhone Trending Sports Fax Server HIPAA Managing Stress Education Touchpad Antivirus Marketing User Error Search Update IT consulting Files Bloatware Safety Storage Analytics Money Chromecast Collaboration Emergency Shortcut Operating Sysytem PowerPoint Entertainment Benefits Cybersecurity Administrator Regulations SharePoint Distributed Denial of Service Presentation Television Branding Solid State Drive Two-factor Authentication Data Breach Reliable Computing Access Teamwork eWaste Retail Excel History Transportation Meetings User intranet Law Enforcement App IT service Virtual Reality Avoid Downtime Saving Time Computer Accessories Robot Cameras Apple