These last weeks have been marked in the technological sector by an unfortunate fact in the form of massive cyber attack that has affected thousands of equipment and companies spread all over the globe. One of the characteristics of this attack was centered on the use of one of the most dangerous and harmful types of malware known, ransomware.
It is popularly known as WannaCry that has affected a large number of teams across the globe by means of the aforementioned malware attack by which the attackers have wanted to raise money in the form of bitcoins by taking advantage of the victim’s vulnerabilities. As many of you know, this type of malicious code in particular is responsible for “blocking”, by blocking the data stored in infected systems which are not unlocked until the victim pays the requested amount, at least in theory.
This is one of the most feared attacks by users, especially when we refer to large companies, since it is very possible that the data treated by them are more sensitive and its blocking affects many more people. The truth is that to date ransomware has been present, at least in most cases, in desktop environments that is to say in the desktop systems. However, from what we have found out recently, things are going to change soon.
The growth of ransomware in mobile phones is imminent
We say this because this week has given the light to a report in which it is alerted that this type of malware is going to extend in an important way between the mobile devices. Although for the moment there have been some cases but things are changing as can be seen from what happened in the first months of 2017, the numbers have multiplied and are expected to do much more. Just to get a better idea of the numbers of Kaspersky Lab, in the last quarter of 2016 there were almost 62,000 attacks of this type, while only in the first 3 months of 2017 this figure has exceeded 218.00 victims in mobiles.
Due to the expected growth to have these attacks that can “hijack” our mobile, it is recommended to be careful when accessing certain links received by mail from unknown sources. It is also necessary to take into account that for the malware to activate, especially the aforementioned ransomware, in most cases requires some interaction by the user himself.