Posted on 09/08/2015 11:16:14 AM PDT by Swordmaker
A malicious Android app that held people to ransom has been found by US security firm Zscaler.
Adult Player appeared to offer pornography, but secretly took pictures of users with the phone's front-facing camera.
It then locked the user's device and displayed a demand for $500 (£330) which was difficult to bypass.
One security expert told the BBC that ransomware was a lucrative and growing area of cybercrime.
Ransomware
The Adult Player app demanded a payment of $500 (£330).
Apps which demand money from people with a threat to release private information, or wipe a device, are known as ransomware.
In August, Intel Security said examples of ransomware had increased 127% since 2014 - primarily affecting desktop computers and laptops.
"One of the reasons for the increase is that it's very easy to make," said Raj Samani, chief technology officer for Intel Security in Europe.
"There are people you can pay to do the work for you, and it pays really well. One group we tracked made more than $75,000 in 10 weeks.
"Apps like this rely on the embarrassment factor. If you don't pay, your reputation is on the line."
Adult Player was the second example of pornography-focused ransomware discovered by Zscaler.
The app was not available from vetted storefronts such as Google Play, but could be installed directly from a webpage.
(Excerpt) Read more at bbc.com ...
Instead of “Ransomware”, in this instance I believe the name should be “Shameware” (not “Sham Wow”).
Although I suspect most of the perps have none...
Personally, I find this amusing.
I bet they catch a lot of libtards masturbating in their Mom’s basement.
Well I had the same thought, wondering what people are doing when watching this stuff, are they undressed etc. The potential for very embarrassing pictures is there.
Did they catch Carlos Danger buffing his clown?
You’re better off with a flip phone.
And be sure to turn the locator off.
Windows phones actually might be more secure than Android or Apple, which have shown themselves to be hideously vulnerable, probably due to the fact that the Android and iOS are just glorified spyware, anyway.
It’s amusing today, but not tomorrow when these extortionists branch out into apps that masquerade as games or actually useful-sounding utilities. That’s the obvious next step.
Ping also to ThunderSleeps, DayGloRed and Shadow Ace for their ping lists.
If you want on or off the Mac Ping List, Freepmail me.
Yup.
Karma.
Just like with Ashley Madison.
Wow...if this app ever took a picture of me naked...
I could make them pay me to not post the picture...
Nobody wants to see me naked...
LOL! So did I.
I do agree with you on that point. Isn’t that being done already?
Personally, this scares the hell out of me. How long will it be before you find a photo-shopped image of yourself on your computer with a ransom demand to prevent the destruction of your good name? They start with legitimate pictures... then they will take it to the next level.
And moms hugging the washing machine on spin
Actually, those kinds of ransomware predate this. This is a newer iteration.
About 3 years ago my company got hit by one, because an employee downloaded a program, and it went and encrypted every file on the networked drive. Luckily, if you have backups, you can just restore from those and delete the encrypted files.
Otherwise, there is no way to get the files back without paying the “ransom”. Of course, there is no way to know that if you pay, they will give you the correct key. Most of the time, paying them does seem to work, but I would refuse to do that on principle.
Obviously, I knew there was no possibility of any kiddie porn on my computers or iOS devices. Zero. None. I also knew that the FBI/Homeland Security did not operate in such an absurd manner; acting as arresting agency, judge, jury, and court clerk to collect a fine.
It was obvious the Ransom Ware was a multi-page script, because closing it re-opened it. Forcing Safari to quit and re-opening Safari, brought back the last session as normal. . . but that page re-opened with the same requestors.
However, you can get rid of it easily in iOS by going to setting while Safari is not running, selecting the Safari listing in Settings, and choosing Clear History and Website data. Then restarting Safari. GONE.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.