Trends in Android ransomware

(Editor’s note: contributed blogs like this are part of ChannelBuzz.ca’s annual sponsorship program. Find out more here. This content originally appeared on ESET’s We Live Security blog.)

2016 brought some interesting developments to the scene, seeing emerge as one of the most pressing cybersecurity issues on the mobile platform. Authors of lock-screen , as well as file-encrypting “crypto-”, used copycat techniques proven effective in desktop , as well as develop their own sophisticated methods specifically designed for Android users.

With more and more consumers switching from PC to mobile, the devices are used to store increasing amounts of valuable data, making Android ransomware ever more worthwhile for attackers. According to LiveGrid®, the number of Android ransomware detections has grown in year on year comparisons by more than 50%, with the largest spike in the first half of 2016.

Figure 1: Android ransomware detection trend, according to ESET LiveGrid®

Among the most dominant tactics used by cybercriminals, lock-screen “police ransomware” has continued to prove its place as the go-to means of scaring victims into paying up. Apart from observing gradual improvements in features of Android ransomware, ESET researchers have also seen cybercriminals put increased effort into keeping a low profile by encrypting and burying the malicious payload deeper into the infected .

Target-wise, Android ransomware operators have been shifting their focus from Eastern European to US mobile users. However, last year also demonstrated an increased activity on the Asian market. This could be seen in the Jisut lock-screen with its localized Chinese ransom message and doubled detections in the previous 12 months.

To find out more about ransomware on Android, its current trends and most noteworthy examples since 2014, read the newly released whitepaper by ESET.

Related Posts Plugin for WordPress, Blogger...

Add your own buzz: Comment Below