Ransomware is a specific type of malware that demands money from a user and, in exchange, promises to release either the files or the functionality of the device being held hostage. According to recent studies, over 40% of all successful malware attacks involve ransomware.
Most mobile ransomware spreads in the same way other types of malware does: through compromised applications. Hackers will usually choose popular apps to mimic or infect, increasing the likelihood that victims will download their version. Once the ransomware has been installed, hackers can gain the ability to send SMS messages, receive contact information, open websites in the browser, turn on/off data, turn on/off Wi-Fi and track your location through GPS.
There are two types of ransomware:
- Lock-screen ransomware
- Crypto ransomware
The two categories differ in terms of the actual resource being retained by the attacker.
Lock-screen ransomware attacks the device from a system level, changing the PIN/password or overlaying a window over all other apps and demanding a ransom to allow use of the device again.
Crypto ransomware encrypts the files on the device and demands a ransom to have them unencrypted.
Both types of ransomware have wreaked havoc on individuals and businesses for many years, causing major financial and data losses.
The fact that this type of malware has made its way to the mobile ecosystem, coupled with the increased use of mobile devices to store important and sensitive information, means potentially severe implications for your security and privacy without the right protection in place.