Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Wednesday, 11 June 2014 / Published in Woo on Tech

Ransomware hits Android Devices

Android Targeted

As if having your Windows computer files and iPhone being held for ransom wasn’t bad enough, Android-based devices can now “enjoy” that ignominious fate as well. Security researchers are reporting that hundreds of Android devices, primarily in Russia and the Ukraine are being infected by a Trojan called “Pletor” which can do just like it’s Windows based counterparts: the victims were tricked into installing the trojan by fake websites, apps and games, and once the victim’s content is encrypted, the trojan demands a ransom of approximately $30-35 USD to unlock the data.

What this means for you:

Though it has happened before, it’s still extremely rare for a Trojan like the above to make it through the screening process that Google performs on all the apps that are available through the Google Play store, and even if one does, it’s pulled quickly. Google can even reach out retroactively to affected phones to remove the harmful app. That being said, it’s not hard to “side-load” apps on Android devices, which is primarily the way Android malware spreads. The easiest way to keep your Android devices safe: don’t side-load apps. Only install apps published through Google’s Play Store. Keep in mind, for everything not a Kindle Fire, installing apps from Amazon’s App Store is considered side-loading, and should only be done if you really know what you are doing. And if you just can’t live without side-loading apps, make sure you don’t store any important information on your device, and keep it well away from sensitive business data. The more risky your activities are on the device, the more likely it is that device will get compromised.

  • Tweet
Tagged under: amazon, Android, Google, kindle, play store, pletor, ransomware, russia, ukraine

What you can read next

Spy Glass
Grad students build Google Glass spy app
Apple-logo.png
Apple’s iPad Mini All But Certain
Applebee's Social Media Disaster
Applebee’s demonstrates how NOT to do social media

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Closeup on phone with YouTube playing

    What We Can Learn About Business Continuity From the YouTube Outage

    YouTube being down is a minor inconvenience for...
  • Insurance Policy on table with technology around to depict cyber insurance

    Cyber Insurance Requirements for 2026: What Professional Services Firms Must Know

    In January 2026, a mid-sized accounting firm in...
  • Multi-Factor Authentication: The Security Measure Your Team Will Hate (But Needs)

    Look, I get it. Multi-factor authentication is ...
  • Business owner pressing an IT button with southern california in the background

    The Real Cost of Managed IT Services in Southern California (2026 Pricing Guide)

    Honest managed IT services in Southern Californ...
  • Person opening their email on a tablet

    Why Your Team Clicked That Phishing Email (And What It Really Means)

    I need to tell you something that might make yo...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP