Categories: Security

The Rise of Increasingly Sophisticated Ransomware

Ransomware, a malicious software that blocks access to users’ data until a ransom is paid, is targeting more people than ever, despite growing awareness of this hacking technique. If you believe that a ransomware virus may be lurking in your phone, or if you’re looking to take a preventative measure, run the Full Virus Scan feature on your device. This feature will search both your phone and SD card for malware. Click here to scan your phone for hidden threats:


Reports of ransomware have jumped in recent years. The number of ransomware reports has grown from 2.3 million to 2.6 million just within the last year — an 11.4% jump. Within the first quarter of 2017, mobile ransomware incidents spiked dramatically, up 253% from the previous quarter. During the past three years, the various strains of ransomware have tripled as hackers have realized their lucrative benefits.

Read More: How Effective is Your Android Security App?

Ransomware Attacks
Recently, the WannaCry strain of ransomware attacked a total of 150 countries between 2015 to 2016. Victims of this sophisticated attack included Russia’s interior ministry and Britain’s National Health Service; they were all ordered to pay a ransom amount in Bitcoin. Later studies uncovered that all victims were Windows users who had failed to update their software.

For mobile users, the mostly common form of ransomware is the “Trojan-Ransom.AndroidOS.Fusob.h” which requests administrator privileges and collects information from the device to upload to a malicious server. This server then determines the device’s worth and blocks device use in order to extort a profit.

New Techniques
As hackers recognize ransomware as a significant source of revenue, their methods and targets are becoming increasingly sophisticated. Oftentimes, scammers will target high-value individuals or systems in an effort to generate the highest returns per victim. Ransomware vendors are also starting to provide ransomware customer support lines to facilitate the exchange of data for payments. As these levels of sophistication increase, future ransomware attacks may develop the ability to evade detection through limited CPU usage, and use self-replication within organizations in order to carry out coordinated ransom attacks.

How to Protect Your Devices
To avoid the danger of losing your private data to a ransomware attack, make sure to backup your phone data regularly, and keep your Android and network software updated. Oftentimes, ransomware is spread through infected emails, so be sure to approach email attachments or messages from strangers with caution. If you are a victim of a ransomware attack, make sure to report the incident to law enforcement, as these attacks are often criminal offenses.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Deepfakes: The New Weapon of Digital Scammers

The revolution of artificial intelligence has brought countless benefits to our daily lives — from…

56 years ago

How to identify a spy app on your smartphone

In the United States, the use of spyware apps is a growing concern, affecting mobile…

56 years ago

5 trending digital scams: how AI is making fraud more dangerous

Every day, millions of mobile phone users receive malicious links through SMS, email, or social…

56 years ago

Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers

Travel is about new experiences — and making payments without hassle is a crucial part…

56 years ago

Malicious links: what they are and how to protect yourself

Every day, millions of  cell phone users receive malicious links via SMS, email, or social…

56 years ago

Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept

Have you heard of Zero Trust? The term is one of the most  important trends…

56 years ago