OMNI Solutions Group Blog

OMNI Solutions Group has been serving the Washington D.C. metropolitan area since 1994, providing IT Support such as technical help-desk support, computer support, and consulting to small and medium-sized businesses.

Ransomware: Coming to a Mobile Device Near You

Ransomware: Coming to a Mobile Device Near You

Ransomware, the unpleasant form of malware dedicated to denying users access to their own device, has become more prominent with mobile technology. While ransomware is typically associated with desktop computers, it’s fully capable of infecting mobile devices. Therefore, it should be no surprise that cases Mobile-based ransomware have increased nearly four-fold in the past year.


According to software security group Kaspersky Lab, their customers in Germany were victimized by mobile ransomware at the highest rate worldwide, followed by Canada, the United Kingdom, and the United States. Furthermore, Kaspersky cited that it protected 35,412 mobile users from ransomware between April of 2014 and March of 2015. During the next year, that total surged upwards to a total of 136,532 users protected. Mind you, these totals aren’t factoring in the number of users who fell victim to their attacks, meaning the actual totals of mobile ransomware victims are likely much, much higher.

Much like the ransomware that attacks desktop and laptop systems, mobile ransomware infects the victim’s phone--however, rather than encrypting the data contained on the phone, which many users have backed up, ransomware on a mobile device will simply block access to apps and display a note explaining how to pay the demanded ransom.

What’s more, many of these mobile ransomwares fight dirty, even by their hacking standards. One particular ransomware originating in Ukraine locks the keys and replaces the home screen with a fraudulent FBI warning and a MoneyPak voucher code. The recipient of such ransomware is someone who (according to the warning) has broken the law by visiting illegal adult-themed websites. The ransomware shows screenshots from said websites included from the user’s browser history, and demands a $500 fine.

Besides the repulsive nature of the screenshots, the most terrifying thing is how indiscriminate these attacks are in selecting their victims. All one needs to do is click on the wrong link on their smartphone to be infected. This was proven in 2014, when a 12-year-old girl unintentionally installed some malware that locked her phone. The malware downloaded some very illegal videos, and threatened to contact the FBI if she didn’t pay $500.

So, how can you defend yourself from mobile ransomware?

  • Update software on a regular basis: Malware and software updates are in a constant race to improve upon themselves, which means that outdated software simply won’t stand up to the more advanced malware. However, if regularly updated, your software stands a much better chance in fighting off an attack.
  • Utilize a cloud-based backup: While not the ideal circumstance, if your cell phone turns out to be beyond saving (without a complete and comprehensive wipe, at least) you will be very happy that your contacts and documents are safe in the cloud.
  • Avoid questionable downloads: Simply put, if you don’t trust the source of a download, don’t download it. Otherwise, you are inviting an attack into your phone.
  • Finally, don’t be afraid to contact the authorities: For this we return to the 12-year-old girl from before, who ultimately contacted her local authorities to report the malware incident. Even if there is illegal material on your phone, law enforcement members will be able to tell that it’s a plant from ransomware.

For more tips on how to avoid threats on all of your devices, contact us at 301-869-6890.

Continue reading
0 Comments

Alert: Petya Ransomware May Be the Worst Yet

Alert: Petya Ransomware May Be the Worst Yet

Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.

Recent comment in this post
AvaSneddon
The role of mistakes is well concern by the time as well as it also may concern by the time. There are well known best research wr... Read More
Wednesday, 27 February 2019 04:22
Continue reading
1 Comment

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Hackers Hosted Solutions Best Practices Backup Internet Business Business Computing IT Services Productivity Google Business Continuity Software Hardware Malware Miscellaneous Windows 10 Microsoft Innovation Computer Disaster Recovery VoIP Mobile Computing Mobile Device Management Mobile Devices Efficiency Network Security Data Windows Workplace Tips Managed Service Provider Smartphone Server IT Support Virtualization Upgrade Email Save Money communications Best Practice Chrome Android Employer-Employee Relationship User Tips Small Business Office Budget Holiday Telephone Systems Recovery Microsoft Office Application Apps Managed IT BYOD VPN Information Technology Quick Tips Hacking IT solutions Network Data Management Outsourced IT Remote Computing Social Engineering Ransomware Firewall Operating System Communication Computers Saving Money Automation Lithium-ion battery Wireless Technology Managed IT Services Tablet Avoiding Downtime Business Intelligence Gmail Hard Drives Disaster Going Green Bandwidth The Internet of Things Passwords Proactive IT Humor Cost Management BDR Spam Facebook Unified Threat Management WiFi DDoS Customer Service Administration Big Data Alert Password Smartphones Phone System Social Hosted Solution Government Streaming Media Telephony Mobility Gadgets Cybercrime Office Tips Browser Private Cloud Remote Monitoring Risk Management Biometrics Network Congestion Health Fax Server Google Drive WIndows 7 Education User Error Colocation IT Technicians Uninterrupted Power Supply Document Management Marketing Applications Managing Stress Bloatware Antivirus Storage hacker Internet of Things IT consulting Analytics Save Time Collaboration Laptop iPhone Shortcut Trending Benefits Sports HIPAA SharePoint Touchpad PowerPoint Entertainment Distributed Denial of Service Search Update Branding Files Regulations Safety Teamwork Two-factor Authentication Presentation Excel eWaste Money Retail Chromecast Reliable Computing Emergency Meetings Operating Sysytem intranet Cybersecurity IT service Administrator Virtual Reality Apple User Saving Time Television Computer Accessories Buisness Science Solid State Drive Data Breach Domains Access Cameras Mouse History Best Available Customer Relationship Management Transportation Printer Law Enforcement App Avoid Downtime Social Media Robot Instant Messaging Printer Server Wearable Technology Reputation Virtual Desktop SaaS Networking Tech Support Bluetooth Data storage Phishing Near Field Communication Running Cable Business Management Maintenance HaaS Human Resources Internet Exlporer Shadow IT