{"id":78642,"date":"2014-06-11T19:08:15","date_gmt":"2014-06-11T13:38:15","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=78642"},"modified":"2014-06-11T19:08:15","modified_gmt":"2014-06-11T13:38:15","slug":"simplocker-android-ransomware-alert","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/simplocker-android-ransomware-alert\/","title":{"rendered":"Simplocker \u2013 Android Ransomware Alert!"},"content":{"rendered":"<p>Last year, we came across a malware named Android Defender. This malware, once inside the victim\u2019s phone, locks the device and demands a ransom to unblock it. This malware is classified as a screen-blocker type ransomware. But now, it seems like hackers have stepped up their game. A new Android malware is doing the rounds on the Internet. And it is being dubbed as the first Android ransomware that encrypts the infected device\u2019s data and demands ransom to decrypt it. It is known as Simplocker.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">What does Simplocker Look Like?<\/span><\/p>\n<p>Once installed in the phone, Simplocker displays an icon named \u201cSex xonix,\u201d as shown in the image below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/06\/android_ransomware_simplocker1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-78647 aligncenter\" alt=\"Android Ransomware Simplocker\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/06\/android_ransomware_simplocker1.png\" width=\"549\" height=\"463\" \/><\/a><\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">What Does Simplocker Do?<\/span><\/p>\n<p>&#8211; Simplocker is a Trojan horse that masquerades as a harmless application for Android devices. Once installed in a device, it displays a message in Russian. The message informs the user that his data has been encrypted and demands a ransom to decrypt it.<\/p>\n<p>&#8211; The ransomware disables the Back and Home button on the compromised device, when it displays its message on the screen. This makes it difficult to uninstall it. The malware is also designed to start every time the device boots.<\/p>\n<p>&#8211; Simplocker scans the SD card of the infected device for various files including pdf, doc, mp4, png, jpeg, etc., and starts encrypting them. In other words, the malware converts files, videos, music files, pdfs, text files, and images into a form that cannot be read or used by the user.<\/p>\n<p>&#8211; The Trojan sends the IMEI (International Mobile Station Equipment Identity) of the infected device to a remote server. This way, the attacker can know when the victim pays the ransom.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">Some Important Facts About \u00a0Simplocker<\/span><\/p>\n<p>&#8211; Simplocker, currently, is only prevalent in the Ukrainian region.<\/p>\n<p>&#8211; It has not been found in Google Play store.<\/p>\n<p>&#8211; It demands a ransom of 260 Ukrainian hryvnias (\u00a313) to decrypt the encrypted data of the victim\u2019s phone.<\/p>\n<p>&#8211; The level of encryption used by Simplocker is weaker compared to that used by <a href=\"https:\/\/blogs.quickheal.com\/alert-ransomware-are-on-the-loose-know-what-precautions-you-should-take-to-prevent-data-loss\/\" target=\"_blank\">CrytpLocker<\/a>, the ransomware that targets the Windows platform.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">Safety Tips to Prevent Simplocker Infection<\/span><\/p>\n<p>1. Always install apps from Google play and official sites.<\/p>\n<p>2. Turn off Bluetooth if not in use.<\/p>\n<p>3. Install a reliable mobile security software that automatically scans apps before they run for the first time.<\/p>\n<p>4. Take regular backups of your important data on your phone on cloud or external storage devices.<\/p>\n<p>5. Before connecting your mobile devices to any computer, ensure that the latter is secure with a multi-layered antivirus software.<\/p>\n<p>6. Avoid clicking links in unknown and unsolicited emails and SMSs.<\/p>\n<p>7. Have your mobile apps updated to their latest version. And ensure that your mobile OS is updated too.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">How Quick Heal Can Help<\/span><\/p>\n<p><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.quickheal.platform.advance.blue\" target=\"_blank\">Quick Heal<\/a> detects this ransomware as Android.Simplelocker.A, and protects user data from being<br \/>\nencrypted by the malware. Readers are advised to follow the safety measures listed above, and install Quick Heal on their mobile.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last year, we came across a malware named Android Defender. This malware, once inside the victim\u2019s phone, locks the device and demands a ransom to unblock it. This malware is classified as a screen-blocker type ransomware. But now, it seems like hackers have stepped up their game. A new Android malware is doing the rounds [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":78649,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[965,133,24,910],"tags":[380,972,982,50,983],"class_list":["post-78642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-adware","category-hacker","category-malware","category-ransomware","tag-android-malware","tag-android-ransomware","tag-android-trojan","tag-ransomware","tag-simplocker"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/78642"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=78642"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/78642\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=78642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=78642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=78642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}