Doublelocker Ransomware is the new nightmare that attacks mobile telephones with Android OS. As a matter of fact, it is quite easy to get infected with this vicious program because virtually it takes a single tap on your touch screen and it can get started. This dangerous ransomware program is indeed a combination of a banking Trojan and a crypto-locker infection. This means that the first thing it does after infiltrating your mobile is hacking your bank accounts or any other financial accounts you may have access to through your mobile. This threat also locks your phone and encrypts your personal information and your files on it. Hopefully, your data is regularly synced with your cloud storage so it is possible for you to recover your phone after you manage to bypass the lock somehow. Of course, it is also possible that you will lost all your data after this malicious attack. We recommend that you remove Doublelocker Ransomware immediately after you realize that you have been hit. Unfortunately, it may not be as easy as it is sometimes on a PC. Please read our full report to learn more about this dangerous ransomware program.
The most important to understand when it comes to such a ransomware infection is probably the distribution method. If you know how it is spread, you may have a chance at avoiding it, too, right? This malware program uses a fake Adobe Flash update pop-up to fool unsuspecting users. You can be exposed to such a pop-up when you land on a suspicious or compromised website while you are surfing. Such a page could be related to online gambling, gaming, file-sharing, or porn in general. If you have visited such pages recently, it is quite possible that this is how you infected your Android OS.
You should never click on such pop-up messages because you cannot know whether they are legitimate or not. If your mobile needs to update your Adobe Flash driver, it is either done automatically from official source or you can do so yourself by visiting the official page or using the Google Play Store. It is not advisable to use any other questionable websites or services because it can end very badly for you as you can see now. Of course, this ransomware can be very deceiving and convincing as well. Imagine that you want to watch a streaming video on an unfamiliar page and as you tap for play, a pop-up appears suddenly claiming that you need to install the latest Adobe Flash version in order to be able to watch your desired video. No wonder why victims feel the urge to install this fake update even if this pop-up actually reveals that you are activating the administrator right for the device. It is vital to understand that most of the time you cannot delete Doublelocker Ransomware or any other ransomware without losing your files to encryption unless, of course, you have a clean backup copy in cloud storage.
Once you install this fake update, this ransomware program asks for “Google Play Services” accessibility feature, which practically grants administrator rights to this malicious threat. Then, it sets itself as the home application, i.e., the application that launches when you press the home button on your phone. The next time you press the home button, it will perform its first mission, which is to hack into your PayPal and bank accounts. Additionally, it also changes your PIN code so that you cannot access or unlock your phone that easily. When its act as a banking Trojan is accomplished, this infection moves into phase two and starts the encryption process. This ransomware targets all your personal information and the files it can find on your device and encrypt these with the AES-256 algorithm.
When the damage is done, this ransomware program displays its ransom note on your mobile screen. This note informs you about the attack and that your phone has got encrypted. You are given 24 hours to pay 0.0130 Bitcoins ($73) to these criminals if you want to unlock your phone and get your files back. Since this beast changes your PIN and locks your screen as well, there is no way for you to simply access your device after this malicious attack. We never encourage anyone to pay ransom fee to cyber criminals. You should know that there is no guarantee whatsoever that you will get your device back along with your files even if you transfer the ransom fee. The most important thing now is to remove Doublelocker Ransomware from your mobile so that you can use it again.
There are basically two things you can do. If your Android phone is unrooted, all you can do is reset it to factory default. This would obviously mean the loss of all your data and settings but hopefully you do have a backup that you can use. If your phone is rooted, you can use a debugging tool, such as Android Debug Bridge (ADB) to unlock your phone and uninstall Doublelocker Ransomware. Please remember that you should only use trustworthy file-sharing places, such as the Google Play Store and official websites to download software and updates. If you want to protect your mobile phone, it may be time to consider installing a mobile-friendly anti-malware program.