![]() ![]() Moore admits that when this is sent from a contact in your contact list, it can be harder not to trust what they are saying. "We need to start realizing that attackers use any way they can to spread malicious software so we shouldn't be too quick to act on a text message, especially from an unverified source," Jake Moore, a cybersecurity specialist at ESET, told me. That encryption is flawed, however, and ESET describes how data can be decrypted without paying any ransom. ![]() Behind the scenes, it acts as a command and control center, spreading more malicious text messages and encrypting user files. That app, of course, is the ransomware itself and comes disguised as the sex simulator game in question. ![]() The SMS text messages that were sent once an Android smartphone was infected by the ransomware, which has 42 different language templates to cover most options, warned the users' friends and family by name that their photos were being used in a "sex simulator game" and provided a link to the app concerned. Using SMS text messages as a distribution channel All the posts shared one thing in common: they contained links or QR codes pointing to malicious apps. The attackers also used technical topics as a lure, hence the use of the XDA developer forum as an attack vector. ESET found that most of the postings to Reddit forums were porn-related, or comments to porn-related threads. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |