Threat Database Malware DoubleLocker

DoubleLocker

By GoldSparrow in Malware

Android devices are attacked by ransomware threats rarely. However, security experts just discovered a malware, which they named DoubleLocker, attacking Android devices. DoubleLocker is based on the code of the infamous Svpeng virus, although DoubleLocker doesn't have the capacity of taking money from the victims' accounts as its predecessor. Instead, DoubleLocker encrypts the victim's data by appending a file extension, 'cryeye' to it, and then presents the victims with a ransom note asking for 0,0130 Bitcoin.

DoubleLocker's controllers do not demand a costly ransom payment. However, as with any ransomware threat, the victims should avoid paying it. Besides not having any guarantee that they will recover the lost data, accepting the criminals' demands is not recommended. DoubleLocker also changes the victims' PINs, which prevent them from accessing their devices and will initiate its actions when the victims press the home button. DoubleLocker spreads through fake Adobe Flash Players downloaded from corrupted websites.DoubleLocker was developed very carefully so that its removal from an infected device is a delicate task. Therefore, infected users should rely on an anti-malware product, which can remove this threat kind without exposing the infected device to further harm.

Trending

Most Viewed

Loading...