Advertisement

Android ransomware authors have a new trick to go with an old shakedown technique

The malicious code gets around security checks that Google, which owns Android, has instituted against previous ransomware kits.

Mobile ransomware scams — in which crooks lock your phone and demand money — are nothing new. But they are getting more clever as cybercriminals find new ways to circumvent security.

The latest example is a ransomware scheme targeting Android phones that Microsoft made public Thursday. According to the research, the malicious code gets around security checks that Google, which owns Android, has instituted against previous ransomware kits.

Instead of abusing a permission feature that controls what apps can do on the phone, as other mobile ransomware scams have, this one triggers an incoming call notice to display the ransom note. It’s “the latest variant of a ransomware family that’s been in the wild for a while but has been evolving non-stop,” Dinesh Venkatesan, a Microsoft researcher, wrote in a blog.

Mobile ransomware generally isn’t as profitable as ransomware attacks on PCs or enterprise networks. But Allan Liska, an analyst at threat intelligence company Recorded Future, said phone-focused ransomware can still be effective.

Advertisement

Ransomware campaigns against mobile devices have stumbled over the last couple of years compared to their network counterparts,” Liska said. “This new evolution in Android ransomware shows that it can still be dangerous. The techniques this actor is using are borrowed from other successful Android malware campaigns.”

Some old tricks with the new

As with other mobile ransomware schemes, the attackers are locking access to the phone rather than encrypting data on the device, said Tanmay Ganacharya, lead of the Microsoft Defender Research team.

“Considering the limited compute power on mobile devices. performing operations like encryption can be very costly and could cause the device to freeze which can be easily noticed by the user,” Ganacharya said.

Ganacharya said the attackers, who are Russian speakers targeting other Russian speakers, have been demanding on average just 1000 rubles, or $13, to unlock the phone. It’s not clear who exactly is behind the scheme, or how successful it has been. Mobile users can generally reset their phones if they don’t want to pay a ransom.

Advertisement

While innovative in some ways, the newly revealed Android ransomware is conventional in others.

It borrows an age-old tactic of impersonating law enforcement and accusing the victim of heinous crimes to demand payment. A ransom note that came with a previous version of the malicious code accuses the mobile user of watching child pornography. If no payment is received, the attackers claim the user will be prosecuted.

That follows a separate scheme, reported in April by security company Check Point, in which Russian-speaking hackers were trying to shake down Android users by claiming to report them to the FBI for possessing pornography. The FBI has previously warned the public that ransomware actors have impersonated the bureau.

Sean Lyngaas

Written by Sean Lyngaas

Sean Lyngaas is CyberScoop’s Senior Reporter covering the Department of Homeland Security and Congress. He was previously a freelance journalist in West Africa, where he covered everything from a presidential election in Ghana to military mutinies in Ivory Coast for The New York Times. Lyngaas’ reporting also has appeared in The Washington Post, The Economist and the BBC, among other outlets. His investigation of cybersecurity issues in the nuclear sector, backed by a grant from the Pulitzer Center on Crisis Reporting, won plaudits from industrial security experts. He was previously a reporter with Federal Computer Week and, before that, with Smart Grid Today. Sean earned a B.A. in public policy from Duke University and an M.A. in International Relations from The Fletcher School of Law and Diplomacy at Tufts University.

Latest Podcasts