Skip to main content

Denesh Techs - Double Locker Ransomware



Double Locker Ransomware attacks android device by changing the device PIN and encrypts all the user data.It uses AES(Advanced Encryption Standard) for encrypting the files in the phone which are nearly impossible to decrypt without the key from the hacker.These Ransomwares are distributed through the fake adobe flash player apps or any other fake android apps.Once the app gets installed,The app prompts the user to activate device administration rights.When user unknowingly allows the permission,Then it starts its process.It encrypts the files by wrapping the data under ( .cryeye ) extension.Then it sets the app as default launcher.Whenever,the user unknowingly pressing the home button each time,the ransomware process running in the background triggers and changes the PIN and locks it immediately.

The only way to recover the device from Double Locker is to factory reset the smartphone.If the device is rooted,without factory resetting the phone,The PIN can be reset and the datas can be restored.But it is required that "USB Debugging" should be enabled before the phone is affected.

The users are advised not to install any suspected apps from any unofficial/untrusted sources.

Comments

Popular posts from this blog

Samsung Galaxy S8 coming with Dual Camera and 4K Screen

Leaked Image of Samsung Galaxy S8 Samsung Galaxy S8 to feature 4K Screen that we all know.Leaks confirm that Samsung Galaxy S8 to be featured with 5.5" 4K UHD Display with pixel density of 808 ppi.4K display gives better VR experience.With Quad HD,VR viewing is inconsistent.So,4K display will solve this problem.Rumours and leaks also suggest that it also features dual rear camera for capturing high end pictures.

Microsoft and Intel Collaborating on a project STAMINA

Microsoft Threat Protection Intelligence and Intel Labs are collaborating for a project named STAMINA. STAMINA: Static Malware As Image Network Analysis is a technique based on Deep Learning. What is Project STAMINA? STAMINA focus on detecting malware using deep learning techniques. It converts the malicious code into 2 dimensional images. Then the images can be used to analyze the characteristics of malware and classifies according to their types. Steps in STAMINA Source: Microsoft The 2D images are fed into the deep neural network which is trained with 60% of the known malware samples. The DNN scans and identify the image as clean or infected. This Image based technique achieves 99.07% of accuracy. Pixel File Sizes for different Image Widths Source: Microsoft and Intel