A pop-up screen accused the phone owner of accessing illegal pornography or pirating music and could not be removed.

However the ransomware was fake – and clearing the browser cache was actually enough to restore full access.

It ran on JavaScript, a code commonly employed by many websites.

The attackers demanded £100 in the form of an iTunes gift card with the code sent via text message to a designated mobile number, said security firm Lookout in a blog about the malware.

“…the attack doesn’t actually encrypt any data and hold it ransom,” wrote its security researchers.

“Its purpose is to scare the victim into paying to unlock the browser before he realizes he doesn’t have to pay the ransom to recover data or access the browser.”

The patch closed the loophole but Professor Alan Woodward, cybersecurity expert at Surrey University said some iPhone users have put off the update because it also includes other changes to the running of the device.

“Some people have held off thinking it sounds fairly major, but obviously if they do that they won’t get the protection,” he said.

“There is this feeling that iOS [Apple’s operating system] and Apple devices in general are less vulnerable.

“This shines a light on the fact that nothing is invulnerable. JavaSript is cross-platform and it’s a matter of how you manage it.”

 

Source: http://bbc.in/2nA95mj

Publisher: Lebanese Company for Information & Studies

Editor in chief: Hassan Moukalled


Consultants:
Lebanon : Dr. Zaynab Moukalled Noureddine, Dr. Naji Kodeih
Syria : Joseph el Helou, Asaad el kheir, Mazen el Makdesi
Egypt : Ahmad Al Droubi
Managing Editor : Bassam Al-Kantar

Administrative Director : Rayan Moukalled

Address: Lebanon, Beirut, Badaro, Sami El Solh | Al Snoubra Bldg., B.P. 113/6517 | Telefax : +961-01392444 - 01392555-01381664 | email: [email protected]

Pin It on Pinterest

Share This