- Outsourcing News
- Outsourcing Press-Releases
- Outsourcing Events
- Outsourcing Analytics
Downloading an application from unverified sources sometimes might not only save users of mobile devices some money, but also pass on to them an unwanted gift in the form of malware.
Researchers of the Slovak IT security firm Eset have discovered the first Android PIN-setting ransomware. LockerPIN sets or changes the device’s PIN lock, unbeknownst to the user as it locks the screen and demands a $500 ransom.
“You can save a few dollars by downloading the application from unverified sources, but always keep in mind, it can result in data or privacy loss, usually of a much bigger emotional or financial value,”
said Eset’s detection engineer Lukáš Štefanko as cited in the company’s press release.
LockerPIN spreads via unverified third party app stores, warez forums and torrents. After a successful installation, the trojan horse tries to obtain Device Administrator privileges by overlaying the system message with its own window and masquerading as an “Update patch installation”.
Currently, even if the trojan is removed, for unrooted devices that aren’t protected by a security solution, there is no simple way to change the PIN except for a factory reset. This, however, results in the loss of all data. To add insult to injury, even if the user decides to pay the ransom, the attackers cannot unlock the device as the PIN is set randomly.
Štefanko specified that based on Eset statistics, the majority of infected Android devices is in the USA with a total percentage share of over 75 percent.
“This is part of a trend where Android malware writers are shifting from targeting mostly Russian and Ukrainian users to Americans where they can arguably make higher profits,”