Categories: BlogInnovation

Protect your Android devices from Ransomware [Free Guide]

Unless you’ve been on blocking out tech news from any feeds you follow, you’ve likely heard the term Ransomware thrown around a lot in the past year. It’s making many headlines, and is one of the most popular, simple, and lucrative methods being used by predators online today.

Ransomware by nature isn’t terribly new—but the game is beginning to change as more and more Android users are being hit by this threat which previously was only targeting desktop users. If you’re interested, you should read on with our article PSA: What is Ransomware?

Android/Lockerpin A

The most recent discovery which caught our attention is software called “Android/Lockerpin A,” which, like conventional types of ransomware, preys on less savvy users by tricking them into giving up administrative permissions to their phone.

This process still triggers a notice requesting your permission to sign over your admin access, but the app presents a fake window about patch installation overtop of the permission notice. This way, when you click to approve “the patch,” you’re in fact granting the app rights to manipulate your phone’s settings—including the ability to set a pin without your permission.

Once the app has set (or reset) the pin to unlock your screen, the only way to regain full control over the device is through a factory reset.

Shortly thereafter, the user will receive a characteristic “ransom” message—a bogus claim from the “FBI” reporting that your device will remain locked until you pay out $500—at which point the lock screen pin is reset (randomly, so even the attacker doesn’t know).

What’s new about this threat?

Previously, the type of ransomware targeting Android users was easily rectified—often they could be undone by installing Android Debug Bridge (ADB) or deactivating those administrative privileges and uninstalling the predatory app while the device is rebooted in safe mode.

Obviously, when the first objective of the threat is to revoke your ability to get beyond the lock screen, your reactive options are severely limited. The only way to regain control of the device is through root access to device or some other form of security management solution installed, apart from a factory reset that would also delete all their data.

What you should do about it

Thankfully, the predatory app doesn’t appear on the Google Play Store, so the only way to encounter Android/Lockerpin A is via third party downloads or torrent sites. As always, be extremely mindful when clicking links and downloading files! For the time being, the only practical way to fight this threat is through preventative action. If you’re interested in protecting yourself or don’t know what steps to take next, get our quick prevention guide below!

[emaillocker id=”5481″][inbound_button font_size=”20″ color=”#c8232b” text_color=”#ffffff” icon=”” url=”http://newmindgroup.com/wp-content/uploads/2013/10/RansomwareAndroidGuide.pdf” width=”” target=”_self”]Download Guide[/inbound_button][/emaillocker]

Luke Reynolds

Luke Reynolds is a new member of Newmind's IT managed services team. Previously he worked with schools, not-for-profits, and businesses to help them acquire and deploy Google Chromebooks on the enterprise level. Luke Reynolds enjoys writing, music, film, and any form of radical human expression. He's also a rabid proponent of Kalamazoo's local roller derby team, the Killamazoo Derby Darlins.

Recent Posts

These 7 AI Trends Are Sweeping the Cybersecurity Realm

Relentless digital innovation has defined the last few years. The symbiotic relationship between AI and…

1 month ago

Online Security: Addressing the Dangers of Browser Extensions

Browser extensions have become as common as mobile apps. People tend to download many and…

2 months ago

How Small Businesses Are Unlocking Growth With Generative AI

Staying ahead in business often means embracing cutting-edge technologies. New tools can unlock new avenues…

2 months ago

Examples of How a Data Breach Can Cost Your Business for Years

In the digital age, data is the lifeblood of businesses. It fuels operations, decision-making, and…

2 months ago

Are Your Smart Home Devices Spying On You? (Experts Say, Yes!)

The integration of smart home devices has become synonymous with modern living. They offer convenience,…

2 months ago

5 Ways to Leverage Microsoft 365’s New AI Innovations

Microsoft 365 has a powerful suite of cloud-based productivity tools. They can help you work…

2 months ago