{"id":3505,"date":"2014-06-13T12:30:07","date_gmt":"2014-06-13T16:30:07","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3505"},"modified":"2020-02-26T18:58:43","modified_gmt":"2020-02-26T14:58:43","slug":"weekly_news_android_encryptor","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/weekly_news_android_encryptor\/3505\/","title":{"rendered":"A Week in the News: The First Android Encryptor"},"content":{"rendered":"<p>It was a busy week with more details on the first ever Android encryptor ransomware, a serious but brief-lived vulnerability in TweetDeck, a look at Apple\u2019s upcoming iOS 8, a Gmail flaw that may have revealed every user address, and more.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111342\/androidencrypt-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5101\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111342\/androidencrypt-1.png\" alt=\"androidencrypt\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><strong>Android Encryptor<\/strong><\/p>\n<p>Last week, reports describing a piece of ransomware that actually encrypted the contents of Android devices began to emerge. This week, Kaspersky Lab expert, Roman Unuchek, described <a href=\"http:\/\/www.securelist.com\/en\/blog\/8225\/The_first_mobile_encryptor_Trojan\" target=\"_blank\" rel=\"noopener nofollow\">the mobile malware<\/a>, which is called Pletor, as the first of its kind.<\/p>\n<p>Pletor was first spotted around a month ago and has spread to 13 countries over that time period. It has infected more than 2,000 machines \u2013 primarily in Russia and the Ukraine \u2013 but also in other European and Asian countries. The peak of the infections came on May 22 when 500 new infections were reported. The Trojan is up for sale on the criminal underground with an impressive $5,000 price tag.<\/p>\n<div class=\"pullquote\">\u201cIf your smartphone has been infected with [Pletor], we recommend that you do not pay the criminals,\u201d Unuchek said. \u201cAll the versions of the Trojans that we have seen contain a key that can be used to decrypt affected files.\u201d<\/div>\n<p>Pletor is infecting devices that visit fake pornographic websites. The Trojan masquerades as a media player required to view videos on those sites. It\u2019s also spreading in games and other Android applications, as well as a Russian mobile phone forum.<\/p>\n<p>\u201cIf your smartphone has been infected with [Pletor], we recommend that you do not pay the criminals,\u201d Unuchek said. \u201cAll the versions of the Trojans that we have seen contain a key that can be used to decrypt affected files.\u201d<\/p>\n<p><strong>TweetDeck Fiasco<\/strong><\/p>\n<p>We reported on <a href=\"https:\/\/www.kaspersky.com\/blog\/serious_vulnerability_tweetdeck\/\" target=\"_blank\" rel=\"noopener nofollow\">a serious security vulnerability in TweetDeck<\/a> yesterday. It could have allowed an attacker to take over a user\u2019s account, post or delete tweets or deface the account. Twitter very quickly provided a patch for the problem, so users need not worry now, but it may be a good idea to go ahead and change your Twitter and TweetDeck passwords if you use the service. If you followed our advice yesterday and revoked access to the TweetDeck application, it\u2019s probably safe to go back and grant the TweetDeck access to your Twitter account once again.<\/p>\n<p>Interestingly, all the TweetDeck issues that occurred yesterday occurred because of an Austrian teen and aUnicode heart that shouldn\u2019t have ever showed up on his Twitter feed. Read more at <a href=\"https:\/\/threatpost.com\/a-day-to-forget-for-teen-at-center-of-tweetdeck-shutdown\/106613\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>.<\/p>\n<p><strong>MAC Address Randomization<\/strong><\/p>\n<p>Apple gave its fans a sneak-peak at the yet-to-be-released iOS 8 mobile operating system from its Worldwide Developers Conference. The release constitutes a fairly substantial rebuild of the iOS application development atmosphere, and you can read a thorough analysis of what we think <a href=\"https:\/\/www.kaspersky.com\/blog\/security_in_apple_ios8\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>Perhaps the most significant change though, is <a href=\"https:\/\/threatpost.com\/ios-8-will-randomize-mac-addresses-to-help-stop-tracking\/106527\" target=\"_blank\" rel=\"noopener nofollow\">Apple\u2019s decision to randomize media access control addresses<\/a> when connecting to wireless networks. MAC addresses are uniquely identifiable. Retailers and others have been known to track MAC addresses to learn more about the behaviors. In iOS 8, iDevices will generate random MAC addresses as they are scanned by wireless networks. The move will quietly make it impossible for retailers to track in-store customer movement and other behaviors.<\/p>\n<p><strong>Are You There, Feedly?<\/strong><\/p>\n<p>A distributed denial of service attack knocked the news aggregation service Feedly and the note-taking and archiving platform Evernote offline yesterday. Evernote pulled out of the DDoS attack pretty quickly and is available to its users at present. Unfortunately, as of Thursday afternoon, <a href=\"https:\/\/threatpost.com\/ddos-attacks-take-down-feedly-evernote\/106585\" target=\"_blank\" rel=\"noopener nofollow\">Feedly remains offline<\/a>.<\/p>\n<p>Feedly did reappear briefly Wednesday afternoon, but was knocked back offline by another wave of DDoS attacks shortly thereafter.<\/p>\n<p><strong>Stay on the Lookout for Spam<\/strong><\/p>\n<p>Google patched a pretty serious vulnerability in its service earlier this week, closing off a hole that could have exposed an unknown number of user Gmail accounts. Some reports have estimated the percentage of account addresses that could have been exposed as high as 100 percent. You can read up on the technical details of the attack on <a href=\"https:\/\/threatpost.com\/token-abuse-exposes-gmail-addresses\/106593\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>. You should be particularly wary of spam in the coming days and weeks, because if anyone exploited this bug in the wild, they could have an absolute trove of Gmail addresses.<\/p>\n<p><strong>In Other News<\/strong><\/p>\n<p>The United States Industrial Control System Cyber Emergency Response Team \u2013 that is the division of the Department of Homeland Security tasked with providing information about industrial control system threats \u2013 issued <a href=\"https:\/\/threatpost.com\/ics-cert-warns-of-easily-hackable-road-signs\/106529\" target=\"_blank\" rel=\"noopener nofollow\">an alert<\/a> warning about easily hackable electronic road signs.<\/p>\n<p><a href=\"https:\/\/threatpost.com\/mozilla-patches-seven-flaws-in-firefox-30\/106584\" target=\"_blank\" rel=\"noopener nofollow\">Mozilla Firefox<\/a> and <a href=\"https:\/\/threatpost.com\/microsoft-patches-ie8-zero-day-critical-word-bug\/106572\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft<\/a> issued updates that fixed a number of critical security vulnerabilities. So you should make sure you install those updates for your Firefox browser Windows machine as soon as possible.<\/p>\n<p>In closing, <a href=\"https:\/\/threatpost.com\/facebook-set-to-let-users-edit-own-advertising-info\/106618\" target=\"_blank\" rel=\"noopener nofollow\">Facebook<\/a> announced today it will soon be rolling out a new feature to give users more control when it comes to the types of advertisements they see on the site.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Exploring the week\u2019s news topics, including #Android #ransomware, a serious @TweetDeck bug, and more.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F5FLt&amp;text=Exploring+the+week%26%238217%3Bs+news+topics%2C+including+%23Android+%23ransomware%2C+a+serious+%40TweetDeck+bug%2C+and+more.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>This week: the first ever Android encryptor malware, a serious Tweetdeck vulnerability arises and is fixed just as quickly, and much more.<\/p>\n","protected":false},"author":42,"featured_media":3506,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[105,20,175,543,433,97,671],"class_list":{"0":"post-3505","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-android","9":"tag-facebook","10":"tag-gmail","11":"tag-news-2","12":"tag-ransomware","13":"tag-security-2","14":"tag-tweetdeck"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/weekly_news_android_encryptor\/3505\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/weekly_news_android_encryptor\/3608\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/weekly_news_android_encryptor\/3944\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/weekly_news_android_encryptor\/4162\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/weekly_news_android_encryptor\/5100\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/weekly_news_android_encryptor\/3967\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/weekly_news_android_encryptor\/5100\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/weekly_news_android_encryptor\/5100\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3505"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3505\/revisions"}],"predecessor-version":[{"id":15813,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3505\/revisions\/15813"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3506"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}