Daily Mirror (Sri Lanka)

CERT|CC issues Doublelock­er ransomware warning

Android phone users cautioned against viewing certain sites

- BY CHATURANGA PRADEEP

The Computer Emergency Readiness Team (CERT|CC) yesterday warned Android mobile users to be cautious of infecting Doublelock­er ransomware when viewing suspicious websites.

Speaking to the Daily Mirror (CERT|CC) Principal Informatio­n Security Engineer Roshan Chandragup­ta said the Doublelock­er ransomware could be affected by installing fake Adobe Flash Player applicatio­ns. Ransomware requests the mobile user to grant access which it uses to activate the device administra­tor rights and set itself as the default home applicatio­n. This allows the ransomware to reactivate itself every time a user clicks on the home button on the phone and new Android ransomware, dubbed Doublelock­er, that has been uncovered, poses multiple threats, he said.

“This ransomware can lock down the victim’s phone, encrypting all data and changing the infected phone’s PIN. This makes it nearly impossible for victims to retrieve data or access their phones without paying a ransom.

According to foreign media, the Doublelock­er was based on a banking trojan and could become a “ransombank­er”, which was essentiall­y a “twostage malware”, that tries to wipe out victims’ bank or Paypal accounts, locking the device and data down completely. In other words, victims would be unable to access their data, including bank credential­s unless a ransom payment is made.

The hackers operating Doublelock­er are demanding a ransom of $54, £40 which the victim is required to pay up within 24 hours. However, if the ransom payment isn’t made within 24 hours, the data is not deleted and instead remains encrypted.

Apart from paying the ransom and obtaining the decryption key from the hackers, the only way victims can clean out the infected device of Doublelock­er is to perform a factory reset.

Newspapers in English

Newspapers from Sri Lanka