Menu
Trojan app encrypts files on Android devices and asks for ransom

Trojan app encrypts files on Android devices and asks for ransom

It's the first Android ransomware threat with file-encrypting abilities, researchers from ESET said

The ransomware model is increasingly being adopted by cybercriminals who target mobile users, one of their latest creations being able to encrypt files stored on the SD memory cards of Android devices.

A new threat dubbed Android/Simplock.A was identified by researchers from antivirus firm ESET over the weekend and while it's not the first ransomware program for Android, it is the first one seen by the company that holds files hostage by encrypting them.

Other Android ransomware apps seen in the past, like Android Defender, found in June 2013, and Android.Koler, discovered in May, primarily used lockscreen techniques and persistent alerts to disrupt the normal operation of infected devices.

"Android/Simplocker.A will scan the SD card for files with any of the following image, document or video extensions: jpeg, jpg, png, bmp, gif, pdf, doc, docx, txt, avi, mkv, 3gp, mp4 and encrypt them using AES [the Advanced Encryption Standard]," the ESET researchers said Wednesday in a blog post.

The malware will then display a ransom message in Russian asking for a payment of 260 Ukrainian Hryvnia (around US$21.40) to be made through a service called MoneXy, suggesting that, at least for now, this threat targets users in Russian-speaking countries.

Using encryption to hold files hostage is a technique made popular among malware writers by Cryptolocker, a Windows ransomware program that infected more than 250,000 computers during the last three months of 2013. The FBI and law enforcement agencies in other countries seized the command-and-control servers used by Cryptolocker as part of a recent operation that also disrupted the Gameover Zeus botnet.

"Our analysis of the Android/Simplock.A sample revealed that we are most likely dealing with a proof-of-concept or a work in progress -- for example, the implementation of the encryption doesn't come close to 'the infamous Cryptolocker' on Windows," the ESET researchers wrote.

The new threat masquerades as an application called "Sex xionix," but it wasn't found on Google Play and its distribution so far is most likely low.

Another interesting aspect of Simplock.A is that it uses a .onion command-and-control (C&C) domain address. The .onion pseudo-top-level domain is only used inside the Tor anonymity network for accessing so-called hidden services.

One installed on a device, the ransomware app sends device identifiable information like the unique International Mobile Station Equipment Identity (IMEI) number back to the C&C server and waits to receive a command to decrypt the files -- most likely after the payment has been confirmed.

"While the malware does contain functionality to decrypt the files, we strongly recommend against paying up -- not only because that will only motivate other malware authors to continue these kinds of filthy operations, but also because there is no guarantee that the crook will keep their part of the deal and actually decrypt them," the ESET researchers wrote.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securitymobile securityencryptionscamsesetdata protectionmalwarefraud

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments