The app was not available from vetted storefronts such as Google Play, but could be installed directly from a webpage.
Zscaler said the app's ransom message kept the phone's screen switched on at all times, and reappeared if the handset was restarted.
'This ransomware acts as a porn app named 'Adult Player' and lures victims who assume it is a pornographic video player,' the firm said.
'When the victim starts using it, the app silently takes a photo of the victim, which is then displayed on the ransomware screen, along with the ransom message.
'The app demands a ransom of 500 USD.'
Adult Player was the second example of pornography-focused ransomware discovered by Zscaler.
The ransom screen is designed to stay persistent even at reboot.
It does not allow the user to operate the device and keeps the screen active with ransom message. The firm said they app was only available from unofficial stores.
Post A Comment:
0 comments: