{"id":34399,"date":"2020-06-30T03:38:00","date_gmt":"2020-06-30T07:38:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=34399"},"modified":"2020-06-30T03:38:00","modified_gmt":"2020-06-30T07:38:00","slug":"new-ransomware-masquerades-as-covid-19-contact-tracing-app-on-your-android-device","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/06\/30\/new-ransomware-masquerades-as-covid-19-contact-tracing-app-on-your-android-device\/","title":{"rendered":"New ransomware masquerades as COVID-19 contact-tracing app on your Android device"},"content":{"rendered":"\n<p>Because there wasn&#8217;t enough going on, now we get this.  Just another example of miscreants taking advantage because they can&#8217;t earn a living legitimately.   <\/p>\n\n\n\n<p>By\u00a0<a href=\"https:\/\/www.zdnet.com\/meet-the-team\/us\/charlie-osborne\/\">Charlie Osborne<\/a> &#8211; A new strain of <strong>ransomware<\/strong> is being deployed in attacks created off the back of the release of contact-tracing apps during the novel\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cnet.com\/health\/coronavirus-test-how-long-does-it-take-to-get-covid-19-results-back\/\" target=\"_blank\">coronavirus pandemic<\/a>.\u00a0<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2020\/05\/15\/18\/46\/corona-5174671__340.jpg\" alt=\"\" width=\"797\" height=\"540\"\/><\/figure><\/div>\n\n\n\n<p>Researchers from ESET\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.welivesecurity.com\/2020\/06\/24\/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor\/\" target=\"_blank\">said this week<\/a>\u00a0that the <strong>ransomware<\/strong> emerged only a few days after Health Canada announced the release of COVID Alert, which will first be tested in Ontario before rolling out nationwide.<\/p>\n\n\n\n<p>While the official app is not due to be made available to mobile device users until next month at the earliest, cyberattackers are trying to capitalize on the government&#8217;s announcement with an Android package of their own &#8212; marketed as Canada&#8217;s official COVID-19 tracing app, but hiding a malicious secret.&nbsp;<\/p>\n\n\n\n<p>According to the cybersecurity firm, two websites offered what appeared to be Health Canada&#8217;s tracing app. However, the now-defunct domains &#8212; tracershield[.]ca and covid19tracer[.]ca &#8212; were actually hosting APKs that, when downloaded, installed the CryCryptor ransomware on Android devices.\u00a0 <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/new-crycryptor-ransomware-masquerades-as-covid-19-contact-tracing-app-on-your-device\/&amp;ct=ga&amp;cd=CAEYBSoUMTY1OTUyMTA3NDgzNzgwNzY4MTQyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNHIdB5Hj4M8m2Q36tLrs8pngAnMFg\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Because there wasn&#8217;t enough going on, now we get this. Just another example of miscreants taking advantage because they can&#8217;t earn a living legitimately. By\u00a0Charlie Osborne &#8211; A new strain of ransomware is being deployed in attacks created off the <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/06\/30\/new-ransomware-masquerades-as-covid-19-contact-tracing-app-on-your-android-device\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[697,637],"class_list":["post-34399","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-covid-19","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/34399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=34399"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/34399\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=34399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=34399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=34399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}