Out of the Box Solutions Blog

Ransomware Increasingly Targets Android Devices

Ransomware Increasingly Targets Android Devices

In recent years, how-to guides and YouTube videos have brought renewed enthusiasm for the phrase ‘Do It Yourself’. From services that will ship all the ingredients needed for a home-cooked meal right to your front door to a kit that contains all of the building materials one needs to make a fully functioning ‘tiny house’, DIY kits have made it easier for someone who is less than an expert to successfully complete a project or learn a skill. The Dark Web has taken this infatuation with ‘DIY’ to a whole new level with a rising increase in the sale of Ransomware kits.

Malware kits are by no means a new concept, as the first kits emerged during the 1990s. Since the advent of the Dark Web, the trade of illicit goods and services on a global scale has never been easier. Then, with the introduction of cryptocurrency - like Bitcoin - to the market, payment for these goods are instant and anonymous.

While it’s true that the majority of these kits are targeted toward Windows, there has been an uptick of malware kits that shifts focus toward other popular operating systems. In fact, over the past year, cyber security experts have seen a sharp increase in the sale of ‘Ransomware kits’ that target Android users. Dubbed by the industry as ‘Ransomware-as-a-Service’, these kits allow nearly any individual - even those with the most rudimentary computer skills - to deploy a legitimate ransomware attack on the victim or victims of their choosing.

What’s worse is that this type of malware, the type that targets Android-based smartphones, can cost a company thousands of dollars, plus lost data, reputation damage, and a whole host of unforeseen losses - but can be purchased by an individual for an average of $200.
There are a few factors that make Android devices such a desirable target. First, as Android is the operating system for more than 86% of smartphones worldwide, a $200 dollar purchase from the Dark Web can really wreak some havoc - and earn the deployer a pretty penny. Second, statistics have shown that Android users are much more likely to be running outdated versions of the OS. This failure to run security patch updates for years on end make the exploits commonly taken advantage of by ransomware more likely to succeed among Android device users.

As a business owner, the use of mobile devices by your employees is almost an inevitability. Your best bet is to cover your bases by implementing a mobile device policy for any type of device that is used for work purposes. Additionally, a mobile device management solution will give your business control over the mobile devices that access your company’s network and data. For more information about how to keep you and your technology safe from external threats, like ransomware, contact Out of the Box Solutions at 800-750-4OBS (4627) today.

3 Key Goals for an Internal IT Team
Tip of the Week: Use the Lessons Learned in 2017 t...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 15 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Internet Cloud Efficiency Browser Malware Android Productivity Hardware Communication User Tips Managed IT services Communications Ransomware Saving Money Microsoft Passwords Small Business Data Collaboration Mobile Device Innovation Applications Users Google Business Intelligence Backup Network Blockchain Hosted Solutions Social Media Wi-Fi Mobile Devices Email Employer-Employee Relationship Windows 10 VoIp Business Management Workplace Tips IT Support Wireless Charging Data Backup Outsourced IT Managed IT Service Virtualization Compliance VPN Remote Computing Patch Management Managed IT Services Computer BDR Data Management Information Computers Data recovery Internet of Things Business Tech Terms Save Money Cortana Networking Wireless Automation Hackers Gmail Software Artificial Intelligence Marketing Virtual Assistant IT Services Cost Management Analytics Cloud Computing Bandwidth Twitter Authorization Digital Data loss Millennials Router Managed Service Streaming Media Vulnerability Machine Learning Database Voice over Internet Protocol Plug-In Online Shopping GDPR Environment Update Tablet Government PowerPoint IT Management Conferencing Inventory Unified Communications Spam Business Technology Websites Internet Explorer Backup and Disaster Recovery Downloads Touchscreen Spyware Cybercrime Proactive IT WannaCry Server Management e-waste G Suite Big Data Excel Sports Server Office Data Protection RAM Edge Virus Safety Threat Hard Drives Trends Microsoft Office 365 HP Telecommuting Tactics Remote Monitoring and Management Settings Storage HIPAA Tip of the week disposal Bring Your Own Device Knowledge Office 365 Reporting Content Filtering Mobile Security Microsoft Teams Miscellaneous Antivirus Phishing Printing Comparison SSD A.I. Access Control Document Management Telecommute Microsoft Office IT budget Connectivity Dark Web Hard Drive User Tip Value Hybrid Cloud Amazon Holiday Physical Security Telephony Medical IT Lead Generation Network Attached Storage Operating System Company Culture Staff Data Breach Dongle Paper Specifications Facebook Movies Authentication Paperless Office Smartphone Workers Maintenance Analysis Battery Technology Tips Apps Error Processors Cables eCommerce Laptop Voice over IP SaaS Password Gadgets Managing Stress Troubleshooting Sales Ink Quick Tips Outlook Disaster Recovery Regulation Alert Printers