{"id":7727,"date":"2017-05-22T07:11:17","date_gmt":"2017-05-22T15:11:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/05\/22\/news-1512\/"},"modified":"2017-05-22T07:11:17","modified_gmt":"2017-05-22T15:11:17","slug":"news-1512","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/05\/22\/news-1512\/","title":{"rendered":"Mobile Menace Monday: Ransomware targets Tencent users"},"content":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Mon, 22 May 2017 14:00:31 +0000<\/strong><\/p>\n<p>Early this April, an increase of infection rates by a variant of ransomware known as Android\/Ransom.SLocker.fh was seen.<\/p>\n<h3>Ransomware targets\u00a0Tencent users<\/h3>\n<p>An especially relevant trait of SLocker.fh is its use of Tenpay to send payment to the criminals. Tenpay is an integrated payment platform by Tencent\u00a0\u2014 China\u2019s largest Internet service portals. Thus, it is no surprise that SLocker.fh originates from China.<\/p>\n<p>In order to\u00a0pay, users must have a QQ ID to send payment; which is provided. \u00a0Since\u00a0Tencent&#8217;s most popular\u00a0platform is QQ Instant Messenger, the criminals are probably targeting these users the most.<\/p>\n<h3>Various iterations to fool users<\/h3>\n<p>Like many Android ransomware apps, SLocker.fh masquerades as various legitimate apps to fool users into accepting escalated rights. Users who\u00a0accept the escalated rights will have their\u00a0device forced to reboot. \u00a0After reboot, users will have their device locked with overlaying screen with instructions to pay.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/mobile-menace-monday-ransomware-targets-tencent-users\/#gallery-18023-1-slideshow\">Click to view slideshow.<\/a> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/mobile-menace-monday-ransomware-targets-tencent-users\/#gallery-18023-2-slideshow\">Click to view slideshow.<\/a> <\/p>\n<h3>Stay protected<\/h3>\n<p>Because Android ransomware is on the rise, users should be extra cautious. You can protect yourself by being cautious of giving superuser and\/or device administrator rights to any app that asks for it. If the app looks shady like the two example above, this is especially true.<\/p>\n<h3>So you&#8217;re infected with ransomware<\/h3>\n<p>A\u00a0good\u00a0anti-malware scanner like <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware&amp;hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes Anti-Malware Mobile<\/a> can remove the ransomware, but only\u00a0BEFORE escalated rights are\u00a0granted. Afterward, it becomes a bit harder. For how to remove such infections, refer to blog post &#8220;<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/05\/difficulty-removing-koler-trojan-or-other-ransomware-on-android\/\" target=\"_blank\" rel=\"noopener noreferrer\">Difficulty removing Koler Trojan or other ransomware on Android?<\/a>&#8221;<\/p>\n<p>As always, stay safe out there.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/mobile-menace-monday-ransomware-targets-tencent-users\/\">Mobile Menace Monday: Ransomware targets Tencent users<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/mobile-menace-monday-ransomware-targets-tencent-users\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Mon, 22 May 2017 14:00:31 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/mobile-menace-monday-ransomware-targets-tencent-users\/' title='Mobile Menace Monday: Ransomware targets Tencent users'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/bitmap.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Because Android ransomware is on the raise, users should be extra cautious.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/anti-malware\/\" rel=\"tag\">Anti-Malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/koler-trojan\/\" rel=\"tag\">Koler Trojan<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/slocker\/\" rel=\"tag\">SLocker<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/triple-m\/\" rel=\"tag\">triple m<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/mobile-menace-monday-ransomware-targets-tencent-users\/' title='Mobile Menace Monday: Ransomware targets Tencent users'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/mobile-menace-monday-ransomware-targets-tencent-users\/\">Mobile Menace Monday: Ransomware targets Tencent users<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,11013,4503,12332,3764,10554,3765,12333,10556,10833],"class_list":["post-7727","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-anti-malware","tag-cybercrime","tag-koler-trojan","tag-malware","tag-mobile","tag-ransomware","tag-slocker","tag-triple-m","tag-trojan"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7727"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7727\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}