{"id":386,"date":"2017-03-01T11:00:49","date_gmt":"2017-03-01T11:00:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/talking-android-ransomware-extorts-victims\/"},"modified":"2019-05-29T12:15:07","modified_gmt":"2019-05-29T12:15:07","slug":"talking-android-ransomware-extorts-victims","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/","title":{"rendered":"Talking Android ransomware extorts victims"},"content":{"rendered":"<p class=\"wls-paragraph\">Imagine a situation where your Android mobile phone or tablet unexpectedly starts talking to you. A super cool new feature, right? Sure, but only until you realize that the female voice that has just \u201ccongratulated\u201d you is actually delivering a message on behalf of lockscreen ransomware. And, if you speak Chinese, you\u2019ve worked out that the price tag for unlocking your Android is set to 40 Yuan (roughly $6).<\/p>\n<p class=\"wls-paragraph\">One member of the well-known Jisut ransomware family (more specifically Android\/LockScreen.Jisut) has recently demonstrated these\u201dlinguistic skills\u201d. ESET mostly detects the malware as <a href=\"http:\/\/www.welivesecurity.com\/2015\/09\/10\/aggressive-android-ransomware-spreading-in-the-usa\/\">Android\/Lockerpin<\/a>, with regard to its other distinctive feature \u2013 the ability to reset the protective lock-screen PIN code.<\/p>\n<p class=\"wls-paragraph\">This talking Android ransomware spreads via a malicious dropper used to decrypt and run the payload. The infection process is activated after the user manually opens the malicious app and taps the \u201cClick for free activation\u201d button at the bottom of the displayed picture.<\/p>\n<div id=\"attachment_89859\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89859\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/4-1qxf4.png\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/4-1qxf4.png 660w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/4-1qxf4-169x300.png 169w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/4-1qxf4-576x1024.png 576w\" width=\"360\" height=\"640\"><\/p>\n<p class=\"wp-caption-text wls-paragraph\">Figure 1 Talking Jisut mimics Lockerpin, changing the original PIN code of the infected device to lock the user out<\/p>\n<\/div>\n<p class=\"wls-paragraph\">Subsequently, the victim is asked to grant admin rights to the malware, making it difficult to remove or uninstall the app. On top of that, the device is locked down and the ransom voice message played.<\/p>\n<p class=\"wls-paragraph\">In addition to extortion, the talking Jisut variant has other intentions \u2013 one example being its attempt to elicit users\u2019 credentials for the Chinese social network QQ.<\/p>\n<p class=\"wls-paragraph\">The malware attempts to dupe users by displaying a fake login screen, similar to the original one used by the service. Any username or password entered by the user is sent directly to the attacker.<\/p>\n<p class=\"wls-paragraph\">This activity is followed by a ransom demand and information on how to proceed with the payment appears on the user\u2019s screen. There\u2019s no way out: if the user somehow manages to close the activity, it only makes matters worse. The device\u2019s own security feature \u2013 PIN lock \u2013 is reset to a new entry code, one unknown to the victim.<\/p>\n<div id=\"attachment_89857\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89857\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/2-yp3e6.png\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/2-yp3e6.png 653w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/2-yp3e6-169x300.png 169w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/2-yp3e6-576x1024.png 576w\" width=\"360\" height=\"640\"><\/p>\n<p class=\"wp-caption-text wls-paragraph\">Figure 2 \u2013 Fake QQ login screen, trying to elicit the user\u2019s credentials<\/p>\n<\/div>\n<div id=\"attachment_89858\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89858\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/3-106spe.png\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/3-106spe.png 718w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/3-106spe-169x300.png 169w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/3-106spe-576x1024.png 576w\" width=\"360\" height=\"640\"><\/p>\n<p class=\"wp-caption-text wls-paragraph\">Figure 3 \u2013 Lock-screen with ransom demand<\/p>\n<\/div>\n<p class=\"wls-paragraph\">Talking lock-screen is merely one of the new Jisut malware family variants seen over the past year, with the overall number of detections seen by ESET doubling compared to 2015. However, not all of those detected were extorting victims. In fact, some were just trying to sell the app or its source code, or instead, simply locked the device without demanding any ransom.<\/p>\n<p class=\"wls-paragraph\">Variants that asked for money often made the process of paying the ransom simpler and more straightforward by adding a QR code that allowed the user to either send a message to the attacker or to make a direct payment.<\/p>\n<p class=\"wls-paragraph\">The majority of Jisuts had only a visible effect\u2013 changing the device\u2019s wallpaper, or audible activity \u2013 playing a sound in the background. This reinforces our previously published belief it wasn\u2019t created for purely financial reasons, but also as a prank.<\/p>\n<p class=\"wls-paragraph\">Jisut family is most widespread in China and it is most probably the work of a gang, one that doesn\u2019t care much about anonymity. Some of the past ransomware nag screens included contact information at the Chinese social network QQ and urged victims to contact the authors to get their files back. If the information at QQ is valid, these malware operators are youths between 17 and 22 years old.<\/p>\n<p class=\"wls-paragraph\">The first variants of Android\/LockScreen.Jisut started appearing in the first half of 2014. Since then, we have detected hundreds of variants displaying different ransom messages, however all based on the same code template. In addition to the ransomware aspect, some variants are spread via an SMS message with a URL link to the malware to all of the user\u2019s contacts.<\/p>\n<p class=\"wls-paragraph\">To find out more about ransomware on Android, its current trends and most noteworthy examples since 2014, read the <a href=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/ESET_Trends_2017_in_Android_Ransomware.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">newly released whitepaper by ESET<\/a>. You\u2019re also welcome to stop by at ESET booth B05, in hall 5, at this year\u2019s <a href=\"https:\/\/www.eset.com\/int\/mwc2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile World Congress<\/a> held in Barcelona, February 27th \u2013 March 2nd, 2017.<\/p>\n<p class=\"wls-paragraph\"><b>How to get rid of Android\/Lockscreen.Jisut<\/b><\/p>\n<p class=\"wls-paragraph\">There are three ways to get rid of the malware if your device has been infected:<\/p>\n<ol>\n<li>You can access it via your mobile device management and manually revoke the admin rights, making it possible to uninstall the infected app. However, there\u2019s a catch: you need to have such an app or functionality installed on the device before being hit by malware.<\/li>\n<li>If the Android device has been rooted, you can use the Android Debug Bridge option, making it possible to communicate with the smartphone or tablet via command-line. However, this option is limited to experienced Android users or developers.<\/li>\n<li>The last resort: a factory reset, which returns the mobile device to a fully functional state, but also deletes its content \u2013 such as pictures, videos or contacts.<\/li>\n<\/ol>\n<div class=\"wp-video\">\n<p><span class=\"mejs-offscreen\">Video Player<\/span><\/p>\n<div id=\"mep_0\" class=\"mejs-container svg wp-video-shortcode mejs-video\" tabindex=\"0\">\n<div class=\"mejs-inner\">\n<div class=\"mejs-mediaelement\"><video id=\"video-89967-1\" class=\"wp-video-shortcode\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/Android_Jisut_Talking_Ransomware_sub.mp4?_=1\" preload=\"metadata\" width=\"320\" height=\"568\" data-mce-fragment=\"1\"><\/video><\/div>\n<div class=\"mejs-layers\"><\/div>\n<div class=\"mejs-controls mejs-offscreen\"><\/div>\n<div class=\"mejs-controls mejs-offscreen\">&nbsp;Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine a situation where your Android mobile phone or tablet unexpectedly starts talking to you. A super cool new feature, right? Sure, but only until you realize that the female voice that has just \u201ccongratulated\u201d you is actually delivering a message on behalf of lockscreen ransomware. And, if you speak Chinese, you\u2019ve worked out that<\/p>\n","protected":false},"author":5,"featured_media":1776,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Talking Android ransomware extorts victims - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Talking Android ransomware extorts victims\" \/>\n<meta property=\"og:description\" content=\"Imagine a situation where your Android mobile phone or tablet unexpectedly starts talking to you. A super cool new feature, right? Sure, but only until you realize that the female voice that has just \u201ccongratulated\u201d you is actually delivering a message on behalf of lockscreen ransomware. And, if you speak Chinese, you\u2019ve worked out that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-01T11:00:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:15:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_494925457-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Talking Android ransomware extorts victims\",\"datePublished\":\"2017-03-01T11:00:49+00:00\",\"dateModified\":\"2019-05-29T12:15:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/\"},\"wordCount\":821,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_494925457-623x410.jpg\",\"articleSection\":[\"uncategorized\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/\",\"name\":\"Talking Android ransomware extorts victims - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_494925457-623x410.jpg\",\"datePublished\":\"2017-03-01T11:00:49+00:00\",\"dateModified\":\"2019-05-29T12:15:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_494925457-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_494925457-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Talking Android ransomware extorts victims\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/01\\\/talking-android-ransomware-extorts-victims\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Talking Android ransomware extorts victims - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/","og_locale":"en_US","og_type":"article","og_title":"Talking Android ransomware extorts victims","og_description":"Imagine a situation where your Android mobile phone or tablet unexpectedly starts talking to you. A super cool new feature, right? Sure, but only until you realize that the female voice that has just \u201ccongratulated\u201d you is actually delivering a message on behalf of lockscreen ransomware. And, if you speak Chinese, you\u2019ve worked out that","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-03-01T11:00:49+00:00","article_modified_time":"2019-05-29T12:15:07+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_494925457-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Talking Android ransomware extorts victims","datePublished":"2017-03-01T11:00:49+00:00","dateModified":"2019-05-29T12:15:07+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/"},"wordCount":821,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_494925457-623x410.jpg","articleSection":["uncategorized"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/","name":"Talking Android ransomware extorts victims - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_494925457-623x410.jpg","datePublished":"2017-03-01T11:00:49+00:00","dateModified":"2019-05-29T12:15:07+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_494925457-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_494925457-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Talking Android ransomware extorts victims"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/01\/talking-android-ransomware-extorts-victims\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/386\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1776"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}