Authored by a Symantec employee

 

Mobile ransomware is a form of malware that steals sensitive data or locks a device permanently and then demands payment before unlocking it or returning the data to the user. People are tricked into accidentally downloading it through social networking schemes, assuming that they are downloading innocent content or critical services.

Safety for every device.

Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
Try for 30 days before you buy with Norton Security Deluxe – helps protect up to 5 of your devices for one low price.

After the malware is downloaded onto a device, it will show a fake message accusing the victim of unlawful engagement before encrypting files and locking the phone. After the payment is processed, often via Bitcoin, the ransomware will send a code to unlock the phone or decrypt the data.

Recent Incidents

Ransomware software is constantly evolving. Last fall, a malware called Cryptolocker infected more than 10,000 computers. The hackers wanted $300 from each victim in exchange for a decryption code. After, the ransomware infiltrated both Apple and Android mobiles.

Another version called Koler A disguised itself as a video player that granted users exclusive access to premium pornography. It disabled the backup button of the browser, so that the screen was stuck on a single page citing the user’s phone was under the control of the hacker.

One of the biggest cases affected the Israeli Electric Authority in January 2016. The entire company was shut down after a worker opened a phishing email. Despite being quickly resolved due to payments being made, the cyberattack impacted the country’s electricity grid, causing a national safety alert.

Protect What’s Yours

One of the simplest ways to protect your mobile devices against ransomware is to constantly upload the latest versions of Flash, Java, Shockware, and other plugins. You can also use firewalls and antivirus software to block pop-ups that may contain the pesky virus. Never click on an email from a user you don’t know and avoid suspicious websites. Also, never install anything you find outside of the Google Play store.

If you’ve already been infected, don’t panic and don’t pay the hacker. You can download Ransomware Removal and other apps to remove ransomware Trojan viruses and unlock encrypted data. Another type of software, Bitdefender, scans your devices regularly for malware concerns.

Always back up the files and data on your mobile devices. If you do get infected, you can easily wipe your mobile phone and restore it to remove any ransomware.

In today’s world, there are many threats to your personal data and privacy. Ransomware can hold your important files hostage or lock your phone until a payment is made. By understanding how and where you can get infected, and knowing how to take the proper procedures to get rid of ransomware, you can take back what is yours.

Don’t wait until a threat strikes.

Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device – like most of us do – you need an all-in-one security suite. Meet Norton Security Premium.
Enjoy peace of mind on every device you use with Norton Security Premium.

No Credit Card Required


Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.

© 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the Lockman Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Google Chrome is a trademark of Google, Inc. Mac, iPhone and iPad are trademarks of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.