Attackers use the old Android vulnerability to install ransomware.
Security researchers reported that the ransomware was being installed using vulnerabilities in older Android devices for ransom. Because many Android devices cannot be updated, millions of devices are vulnerable to high-risk vulnerabilities that have been fixed. The latest attack combined at least two high-risk vulnerabilities, affecting Android v 4.0 to v4.3. One of these vulnerabilities gives attackers root access. The vulnerability exploitation code was found to be widely used for reference-if not completely copied-the Android Attack Script leaked by the Italian security company Hacking Team in last July. Malicious JavaScript scripts use advertisements to install ransomware Cyber. Police on vulnerable devices, and then lock the devices. Security researchers discovered that ransomware could be removed by restoring to the factory state.