Is Your Smartphone – The Next Ransomware Victim!

Mobile Ransomeware

Recently more than 4 lakhs vulnerable computer systems were infected with the tricky Ransomware Wannacry as the outbreak quickly spread across the world. This attack results in the disappearance of lots of valuable personal or official data, either one had to pay around 300$ to 600$ within a week to get their data back.

Around 98% of victims were using Windows 7 – The most used OS in Computer segments. The world has seen the consequence of this attack in the cyber world.After these attack one more question arise is that “Is your Smartphone is also vulnerable to Ransomware kind of Attack.”

Most of us knows the answer. It’s a big YES.

Let’s start this from the report back on September 16 published by Nokia i.e.“Nokia Threat Intelligence Report”.

According to Nokia Threat Intelligence Report (Sept - 2016)

  • Mobile device infections rose 96 percent in the first half of 2016, reaching an all-time high in April.
  • In April, one out of every 120 Smartphone’s had some type of malware infection.
  • Smartphone’s accounted for 78 percent of all mobile network infections.
  • Android (One of the most used mobile OS) smartphones were the most targeted mobile platform, accounting for 74 percent of all malware infections.
  • Malware is becoming more sophisticated, utilizing multiple methods to bypass safeguards and take permanent control of devices.
  • The top three mobile malware threats were Uapush.A, Kasandra.B and SMSTracker, together accounting for 47 percent of all infections.

These stats clearly conclude that our smartphones are not secure and any data in your phone will not remain private even if you did not shared it publicly.

On March 27-2017, again Nokia has released info about 2nd half of 2016 threat report that Stats

  • Smartphone malware rises 400% in 2016.
  • 83% Increase in smartphone infections in the second half of 2016
  • Smartphones account for 85% of mobile infections
  • Mobile device infection rates peaked in October at 1.35%
  • Windows/PC systems connected to the mobile network using dongles or tethered through phones accounted for 15 percent of infections

On November 16 - A Security firm Kryptowire, discovered that the mobile phone firmware software keeps track of user’s every move and transmits all data including the full-body of text messages, contact lists, call history with full telephone numbers, unique device identifiers including the International Mobile Subscriber Identity (IMSI) and the International Mobile Equipment Identity (IMEI) to a server in China.

On 23rd Jan 17 - security firm - Checkpoint, discovered a new variant of Humming Bad malware called Humming Whale, which was hidden in more than 20 apps in Google Play Store. After this Google had removed, around 132 apps from its Google play store

On 25th May 17 - Again Checkpoint, discovered another malware campaign on Google Play Store. The malware, dubbed “Judy”, is an auto-clicking adware, which was found on 41 apps developed by a Korean company Kiniwini. According to the checkpoint, this might be the biggest malware campaign ever & approximately spread between 4.5 million and 18.5 million downloads. This infection is supposed to be on Google Play Store since several years.

Judy generates a large number of fraudulent clicks on Google ads from an infected device. This generates a huge income from a website that was loaded on an infected device. After this news, Google has removed dozens of Android applications from its Play mobile application store.

One thing is clear after this reports is that, if you didn’t pay attention towards the security of your Smartphone then you are most likely to be the next mobile Ransomware victim. The result is clear. Either you lose your data or your private data will be in hands of some random hacker.

The preventive steps to secure your mobile from such malware attack will be shared on this blog series soon.

Google now focuses on security for its devices and the next Android version O will be much more secure from its previous versions. The details regarding all security features of Android O will be shared in next blog.

Till then keep suggesting your valuable feedback in comment section.

Also, share with us if you ever experienced such malware attack and how you recover from that malware attack.

[ruasubscriber]

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version