His pandemic coronavirus, continues to spread rapidly. So far, the virus has infected 153.000 people and claimed the lives of 5.800 people worldwide. And while the situation is spreading terror, malicious players are trying to exploit the prevailing climate of security to infect Covidlock smartphone devices. ransomware.
The site, known as the "coronavirusapp [.] Site", has credentials from World Health Organization (WHO) and the Centers for Disease Control and Prevention (CDC). In addition, it claims that its app has over 6 million reviews and a 4,4 star rating.
The app promises to send alerts to the user when it detects a case of coronavirus located near its site. However, once the user has installed the app and granted various permissions on their device, it is attacked by Covidlock, which forces it to change its screen lock.
The victim then receives a 48-hour message to pay for the ransom he asks for. The message threatens the user that if he does not pay in time, he will erase everything data from their device and will additionally leak their accounts SOCIAL MEDIA of. The amount that hackers ask for is $ 100 at Bitcoin.
So far, no case has been known about the ransom being paid. Meanwhile, the security company claims to have used reverse engineering and discovered the decryption keys and plans to publish them soon.
Of course it is not the only incident that exploits the state of horror. A few days ago a fake coronavirus tracking map was installed that installed a malware on computers to steal passwords.
DomainTools notes that a worrying number domain, is registered around the coronavirus. "These listings have grown significantly in recent weeks and many of them are scams."
A similar incident happened recently in Iran, where an app promised to inform people if they were infected with coronavirus. But in reality, what he did was collect the location data of Iranian citizens.