OMNI Solutions Group Blog

OMNI Solutions Group has been serving the Washington D.C. metropolitan area since 1994, providing IT Support such as technical help-desk support, computer support, and consulting to small and medium-sized businesses.

Ransomware: Coming to a Mobile Device Near You

Ransomware: Coming to a Mobile Device Near You

Ransomware, the unpleasant form of malware dedicated to denying users access to their own device, has become more prominent with mobile technology. While ransomware is typically associated with desktop computers, it’s fully capable of infecting mobile devices. Therefore, it should be no surprise that cases Mobile-based ransomware have increased nearly four-fold in the past year.


According to software security group Kaspersky Lab, their customers in Germany were victimized by mobile ransomware at the highest rate worldwide, followed by Canada, the United Kingdom, and the United States. Furthermore, Kaspersky cited that it protected 35,412 mobile users from ransomware between April of 2014 and March of 2015. During the next year, that total surged upwards to a total of 136,532 users protected. Mind you, these totals aren’t factoring in the number of users who fell victim to their attacks, meaning the actual totals of mobile ransomware victims are likely much, much higher.

Much like the ransomware that attacks desktop and laptop systems, mobile ransomware infects the victim’s phone--however, rather than encrypting the data contained on the phone, which many users have backed up, ransomware on a mobile device will simply block access to apps and display a note explaining how to pay the demanded ransom.

What’s more, many of these mobile ransomwares fight dirty, even by their hacking standards. One particular ransomware originating in Ukraine locks the keys and replaces the home screen with a fraudulent FBI warning and a MoneyPak voucher code. The recipient of such ransomware is someone who (according to the warning) has broken the law by visiting illegal adult-themed websites. The ransomware shows screenshots from said websites included from the user’s browser history, and demands a $500 fine.

Besides the repulsive nature of the screenshots, the most terrifying thing is how indiscriminate these attacks are in selecting their victims. All one needs to do is click on the wrong link on their smartphone to be infected. This was proven in 2014, when a 12-year-old girl unintentionally installed some malware that locked her phone. The malware downloaded some very illegal videos, and threatened to contact the FBI if she didn’t pay $500.

So, how can you defend yourself from mobile ransomware?

  • Update software on a regular basis: Malware and software updates are in a constant race to improve upon themselves, which means that outdated software simply won’t stand up to the more advanced malware. However, if regularly updated, your software stands a much better chance in fighting off an attack.
  • Utilize a cloud-based backup: While not the ideal circumstance, if your cell phone turns out to be beyond saving (without a complete and comprehensive wipe, at least) you will be very happy that your contacts and documents are safe in the cloud.
  • Avoid questionable downloads: Simply put, if you don’t trust the source of a download, don’t download it. Otherwise, you are inviting an attack into your phone.
  • Finally, don’t be afraid to contact the authorities: For this we return to the 12-year-old girl from before, who ultimately contacted her local authorities to report the malware incident. Even if there is illegal material on your phone, law enforcement members will be able to tell that it’s a plant from ransomware.

For more tips on how to avoid threats on all of your devices, contact us at 301-869-6890.

Continue reading
0 Comments

Alert: Petya Ransomware May Be the Worst Yet

Alert: Petya Ransomware May Be the Worst Yet

Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.

Recent comment in this post
AvaSneddon
The role of mistakes is well concern by the time as well as it also may concern by the time. There are well known best research wr... Read More
Wednesday, 27 February 2019 04:22
Continue reading
1 Comment

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Hackers Hosted Solutions Best Practices Backup Internet Business Business Computing IT Services Productivity Business Continuity Google Software Hardware Malware Miscellaneous Windows 10 Innovation Computer Disaster Recovery Microsoft VoIP Mobile Computing Mobile Device Management Network Security Efficiency Data Windows Workplace Tips Managed Service Provider Smartphone Server IT Support Mobile Devices Upgrade Save Money communications Email Virtualization Android Employer-Employee Relationship Chrome User Tips Small Business Office Best Practice Budget Holiday Managed IT Microsoft Office Hacking BYOD IT solutions Network VPN Information Technology Data Management Outsourced IT Quick Tips Telephone Systems Recovery Application Apps Communication Computers Managed IT Services Saving Money Avoiding Downtime Gmail Tablet Business Intelligence Bandwidth The Internet of Things Hard Drives Remote Computing Social Engineering Disaster Ransomware Operating System Going Green Automation Lithium-ion battery Wireless Technology Firewall Password Unified Threat Management Social Administration Big Data Hosted Solution Government Streaming Media Telephony Smartphones Mobility Cybercrime Office Tips Phone System Browser Private Cloud Remote Monitoring Risk Management Network Congestion Health Gadgets Proactive IT Cost Management Biometrics BDR Spam Facebook WiFi DDoS Customer Service Passwords Humor Alert Teamwork Two-factor Authentication Retail Excel eWaste Money IT consulting Emergency Chromecast Meetings Operating Sysytem intranet Cybersecurity IT service Administrator PowerPoint Virtual Reality Computer Accessories Apple Saving Time Television Entertainment Buisness Regulations Science Solid State Drive Data Breach Domains Access Presentation Mouse History Customer Relationship Management Reliable Computing Transportation Law Enforcement App Avoid Downtime User Robot Instant Messaging Wearable Technology Reputation Virtual Desktop SaaS Networking Tech Support Cameras Best Available Bluetooth Data storage Phishing Running Cable Business Management Maintenance HaaS Human Resources Internet Exlporer Printer Shadow IT Fax Server Google Drive Education User Error Colocation IT Technicians Uninterrupted Power Supply Printer Server Social Media Document Management Applications Bloatware Storage hacker Internet of Things Analytics Save Time Collaboration Laptop Near Field Communication iPhone Shortcut Trending Benefits Sports HIPAA WIndows 7 SharePoint Touchpad Distributed Denial of Service Search Update Safety Managing Stress Branding Files Antivirus Marketing