OMNI Solutions Group Blog

OMNI Solutions Group has been serving the Washington D.C. metropolitan area since 1994, providing IT Support such as technical help-desk support, computer support, and consulting to small and medium-sized businesses.

Ransomware: Coming to a Mobile Device Near You

Ransomware: Coming to a Mobile Device Near You

Ransomware, the unpleasant form of malware dedicated to denying users access to their own device, has become more prominent with mobile technology. While ransomware is typically associated with desktop computers, it’s fully capable of infecting mobile devices. Therefore, it should be no surprise that cases Mobile-based ransomware have increased nearly four-fold in the past year.


According to software security group Kaspersky Lab, their customers in Germany were victimized by mobile ransomware at the highest rate worldwide, followed by Canada, the United Kingdom, and the United States. Furthermore, Kaspersky cited that it protected 35,412 mobile users from ransomware between April of 2014 and March of 2015. During the next year, that total surged upwards to a total of 136,532 users protected. Mind you, these totals aren’t factoring in the number of users who fell victim to their attacks, meaning the actual totals of mobile ransomware victims are likely much, much higher.

Much like the ransomware that attacks desktop and laptop systems, mobile ransomware infects the victim’s phone--however, rather than encrypting the data contained on the phone, which many users have backed up, ransomware on a mobile device will simply block access to apps and display a note explaining how to pay the demanded ransom.

What’s more, many of these mobile ransomwares fight dirty, even by their hacking standards. One particular ransomware originating in Ukraine locks the keys and replaces the home screen with a fraudulent FBI warning and a MoneyPak voucher code. The recipient of such ransomware is someone who (according to the warning) has broken the law by visiting illegal adult-themed websites. The ransomware shows screenshots from said websites included from the user’s browser history, and demands a $500 fine.

Besides the repulsive nature of the screenshots, the most terrifying thing is how indiscriminate these attacks are in selecting their victims. All one needs to do is click on the wrong link on their smartphone to be infected. This was proven in 2014, when a 12-year-old girl unintentionally installed some malware that locked her phone. The malware downloaded some very illegal videos, and threatened to contact the FBI if she didn’t pay $500.

So, how can you defend yourself from mobile ransomware?

  • Update software on a regular basis: Malware and software updates are in a constant race to improve upon themselves, which means that outdated software simply won’t stand up to the more advanced malware. However, if regularly updated, your software stands a much better chance in fighting off an attack.
  • Utilize a cloud-based backup: While not the ideal circumstance, if your cell phone turns out to be beyond saving (without a complete and comprehensive wipe, at least) you will be very happy that your contacts and documents are safe in the cloud.
  • Avoid questionable downloads: Simply put, if you don’t trust the source of a download, don’t download it. Otherwise, you are inviting an attack into your phone.
  • Finally, don’t be afraid to contact the authorities: For this we return to the 12-year-old girl from before, who ultimately contacted her local authorities to report the malware incident. Even if there is illegal material on your phone, law enforcement members will be able to tell that it’s a plant from ransomware.

For more tips on how to avoid threats on all of your devices, contact us at 301-869-6890.

Continue reading
0 Comments

Alert: Petya Ransomware May Be the Worst Yet

Alert: Petya Ransomware May Be the Worst Yet

Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.

Recent comment in this post
AvaSneddon
The role of mistakes is well concern by the time as well as it also may concern by the time. There are well known best research wr... Read More
Wednesday, 27 February 2019 04:22
Continue reading
1 Comment

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Hackers Best Practices Hosted Solutions Backup Internet Business Computing Business IT Services Productivity Business Continuity Google Hardware Malware Software Windows 10 Miscellaneous Innovation Computer Microsoft Disaster Recovery VoIP Mobile Computing Mobile Device Management Data Windows Workplace Tips Smartphone Managed Service Provider Server IT Support Network Security Mobile Devices Efficiency Upgrade Email Virtualization Save Money communications Best Practice Small Business Office Budget Android Employer-Employee Relationship User Tips Holiday Chrome BYOD VPN Information Technology Telephone Systems Quick Tips Recovery Application Apps Managed IT Hacking IT solutions Network Microsoft Office Data Management Outsourced IT Bandwidth The Internet of Things Remote Computing Social Engineering Ransomware Tablet Operating System Business Intelligence Hard Drives Automation Lithium-ion battery Wireless Technology Disaster Going Green Managed IT Services Avoiding Downtime Firewall Gmail Communication Computers Saving Money Smartphones Proactive IT Phone System Cost Management BDR Spam Facebook WiFi DDoS Customer Service Gadgets Alert Password Biometrics Social Passwords Hosted Solution Humor Government Streaming Media Telephony Mobility Unified Threat Management Cybercrime Office Tips Browser Private Cloud Remote Monitoring Administration Risk Management Network Congestion Big Data Health Presentation Running Cable Business Management Maintenance HaaS Human Resources Internet Exlporer Shadow IT Fax Server Google Drive Reliable Computing Education User Error Colocation IT Technicians Uninterrupted Power Supply Document Management Applications Bloatware Storage User hacker Internet of Things Analytics Save Time Cameras Collaboration Laptop Best Available iPhone Shortcut Trending Benefits Sports HIPAA Printer SharePoint Touchpad Distributed Denial of Service Search Update Safety Branding Files Printer Server Teamwork Social Media Two-factor Authentication Retail Excel eWaste Money Emergency Chromecast Meetings Operating Sysytem intranet Near Field Communication Cybersecurity IT service Administrator Virtual Reality Computer Accessories WIndows 7 Apple Saving Time Television Buisness Science Solid State Drive Data Breach Domains Access Mouse Managing Stress Antivirus History Marketing Customer Relationship Management Transportation IT consulting Law Enforcement App Avoid Downtime Robot Instant Messaging PowerPoint Wearable Technology Reputation Virtual Desktop SaaS Networking Tech Support Entertainment Regulations Bluetooth Data storage Phishing