Rise of Android Ransomware
Rise of Android Ransomware
Ransomware
Document version:
1.0
Authors:
Robert Lipovský, Senior Malware Researcher
Lukáš Štefanko, Detection Engineer
Gabriel Braniša, Malware Researcher
The Rise of Android Ransomware
Contents
Summary.................................................................................................................................. 3
Ransomware on Android................................................................................................. 3
Malware self-protection...................................................................................... 5
Android Defender.....................................................................................................7
Police ransomware............................................................................................... 10
Simplocker..................................................................................................................11
Simplocker in English.............................................................................. 13
Lockerpin....................................................................................................................14
Jisut...............................................................................................................................16
2
The Rise of Android Ransomware
Like other types of Android malware – SMS trojans, for example – • Lock-screen ransomware
ransomware threats have been evolving over the past few years and
malware writers have been adopting many of the same techniques that • Crypto-ransomware
have proven to be effective in regular desktop malware.
In lock-screen types of ransomware, the hijacked resource is access to
Both on Windows and on Android, lock-screens are nowadays usually the compromised system. In file-encrypting “crypto-ransomware” that
of the “police ransomware” kind, trying to scare the victims into hijacked resource is the user’s files.
paying up after (falsely) accusing them of harvesting illegal content on
Both types have been a very prevalent problem on the Windows
their devices. Likewise, as with the infamous Windows Cryptolocker
platform since 2013, when ransomware started to increase in popularity
ransomware family, crypto-ransomware on Android started using
among cybercriminals, even though it had been around for many years
strong cryptography, which meant that affected users had no practical
before. Ransomware infections have been causing trouble both to
way of regaining the hijacked files. And because everyday data, such as
individuals and to businesses.
photos, for example, are now kept on smartphones rather than PCs by
so many people, the threat of losing this data is now greater than ever.
Since one of the most noticeable trends in regard to Android malware
is that malware writers have been bringing to this platform malware
One interesting observation that we have made is that the attackers’
techniques that have proven to be successful on Windows, the
center of focus is no longer only Eastern European countries. A number
appearance of ransomware on the most popular mobile platform was
of recent families, such as Android/Simplocker and Android/Lockerpin,
logical and anticipated.
for example, have been targeting victims mostly in the USA.
3
The Rise of Android Ransomware
4
The Rise of Android Ransomware
5
The Rise of Android Ransomware
Legitimate Device Administrator applications use these extended and then try to trick users into paying money to remove the threats
permissions for various (mostly security-related) reasons. Malware, with which the files are supposedly infected. They’re also referred to as
on the other hand, uses this Android feature for its own protection “scareware”, because they extort payment from the victim after scaring
against uninstallation. Before such an app can be uninstalled, its Device them into believing that their device is infected.
Administrator rights must first be revoked.
Rogue AVs are generally not considered ransomware – while they
Some malware, such as Android/Lockerpin, additionally uses the extra also attempt to get money from the victim, they typically rely on
permissions only available to Device Administrator applications to set or persuasion rather than extortion and the tricked users usually believe
change the lock screen PIN. they’re paying for a legitimate product. However, some fake AV authors
decided to make their software more aggressive by adding lock-screen
ransomware behavior.
ANDROID RANSOMWARE CHRONOLOGY
Most lock-screen ransomware on Windows belongs to the so-called
police ransomware category, and the same trend can be observed
on Android. Police ransomware increases its chance of success (of a
payment by the victim) by using another scareware tactic – they try to
scare the afflicted users by displaying a message purportedly from a law
enforcement agency, such as the FBI, claiming that illegal activities has
been detected on their device.
Fake AVs are a malware type that has been around for a long time – on
Android since 2012 and on desktop platforms since at least 2004. As the
name implies, they display a fake antivirus scan of files on the device
6
The Rise of Android Ransomware
ANDROID DEFENDER At this stage, the user still has the option
of “continuing unprotected” and closing
Android Defender, which was first spotted in mid-2013, is a typical
the app. However, a background service
example of a fake antivirus and probably the first actual ransomware
belonging to the fake AV makes the
targeting Android.
phone practically unusable by displaying
never-ending malware warning popups
As is evident from Figure 4, the graphical user interface of the
each time the user tries to launch an
application tries to make it appear to the victims that they’re dealing
application. Clicking “Stay unprotected”
with a legitimate security application. Interestingly, during the fake
dismisses the currently displayed popup,
scan, the trojan displays names of files that actually exist on the phone’s
only to see another one pop up, and so
memory card, which makes it even more believable. The malware
on…
names shown are real too, except the phone isn’t actually infected with
them.
7
The Rise of Android Ransomware
In the event that the infected user gives RANSOMWARE MEETS FAKE AV, MEETS…PORN
up and decides to pay, the fraud will set
The second fake AV ransomware example doesn’t go under a made-
him or her back by at least 89.99 USD.
up name like Android Defender, but instead parasitizes the name of
What’s even worse is that the user’s
a legitimate Android security application from Avast 1. Fake copies of
credit card details are now in the hands
legitimate antivirus programs used to be the domain of rogue AVs on
of the malware operators (or anyone
Windows. Curiously, the malware, detected by ESET as Android/FakeAV.E
sniffing on the network, as the data
also abuses another well-known brand: it spreads by pretending to be a
are sent unencrypted) and available for
mobile app for the adult video website PornHub.
further misuse.
8
The Rise of Android Ransomware
The narrative in this fraud is rather odd. First, the message shown
by the fake Avast GUI states that the “device is in danger and is now
blocked for security reasons” and that a Pro version must be bought.
While a legitimate antivirus would obviously not render a device
unusable, that text is more-or-less corresponds to rogue AV behavior.
However, the ransom nag screen that’s displayed as the devices is
locked talks about an obligation to pay a 100 USD fine to avoid legal
consequences.
9
The Rise of Android Ransomware
POLICE RANSOMWARE
Lockscreen ransomware on Windows has used various themes in the
past. Some earlier examples included lockscreens that appeared as a
blue-screen-of-death (BSOD), or a Windows activation message. While
we still occasionally spot various new lockscreen themes, the one that
recurs most commonly in recent years is police ransomware. Reveton is
one of the best-known families of this type.
Police ransomware claims that the device has been locked by a local
law enforcement agency because illegal content or activity has been
detected. The ransom messages sometime quote some Criminal
Code article but say that the user can get away with just a fee. Police
ransomware often uses IP-based geolocation in order to “customize”
the infection for the user with banners of local law enforcement
agencies.
Figure 11 - First police ransomware variants were Figure 12 - Android/Locker variants capable of displaying a camera shot and adjusting the ransom
targetting Russian-speaking Android users. screen based on the user’s location – example shows Russian, Ukrainian, and Kazakh banners
10
The Rise of Android Ransomware
SIMPLOCKER
In May 2014, ESET detected the first file-encrypting ransomware for
Android – an expected evolution, as this kind of malware has been
extremely widespread on the Windows platform in the recent years,
Cryptolocker, Cryptowall, CTB-Locker, and TorrentLocker being just a
few of many infamous examples.
11
The Rise of Android Ransomware
Figure 15 – Simplocker using the front camera feed to intimidate the victim
12
The Rise of Android Ransomware
We have not seen Android/Simplocker spreading through the official The latest variants have slightly changed the ransom request visuals.
Google Play store. Instead of the FBI, it is the NSA that’s accusing the victim of “attending
forbidden pornographic sites” (sic) and asking for a 500 USD payment.
Simplocker in English
Only one month after discovering the first Simplocker variants, we
began detecting new versions of this ransomware that featured a few
significant improvements.
13
The Rise of Android Ransomware
Another noteworthy change was that the malware started to use the The technique that Lockerpin uses for locking the device is extremely
XMPP (Extensible Messaging and Presence Protocol) protocol (Jabber) simple – it leverages the built-in Android PIN screen locking
for communication with its C&C server. Using XMPP makes it more mechanism. It is able to set a PIN on the device, or even change it if it
difficult to trace the C&C servers than if HTTP were used. Android/ was already set. It is able to do so, provided that the victim has granted
Simplocker uses this instant messaging communication protocol to the malicious app Device Administrator privileges.
send information about the infected device to the server and to execute
commands received. A third type of C&C server addressing used by
some Android/Simplocker variants is the use of Tor .onion domains.
LOCKERPIN
In previous Android lockscreen trojans, the screen-locking functionality
was usually achieved by constantly bringing the ransom window to the
foreground in an infinite loop. While various self-defense mechanisms
were implemented to keep the device user locked out, it wasn’t too
difficult to get rid of the malware, and thus to unlock the device, by
using Android Debug Bridge (ADB) or deactivating Device Administrator
rights and uninstalling the malicious application in Safe Mode. Figure 18 - Android/Lockerpin geographic distribution
Unfortunately, with Android/Lockerpin, which we discovered in August According to ESET’s LiveGrid® statistics, most of the infected Android
2015, malware writers have stepped up their game. If a user becomes devices are in the USA, with a percentage share of 72%. This is part of
infected with this Android ransom-locker, the only way to remove the a trend whereby Android malware writers are shifting from targeting
PIN lock screen is if the device was previously rooted or has an MDM mostly Russian and Ukrainian users to targeting victims in the United
solution installed that is capable of resetting the PIN. Otherwise, the States, where arguably they can make bigger profits.
last option is a factory reset, which deletes all data on the device.
14
The Rise of Android Ransomware
The malware has been spreading disguised as an app for viewing adult After installation, the typical police
videos. ransomware scenario ensues. The user
is shown a bogus message from the
Earlier versions of the Android/Locker family obtain Device FBI requesting a 500 USD ransom for
Administrator status in just the same way as all other Android trojans, allegedly viewing and harboring forbidden
which use them mostly as protection against uninstallation – they rely pornographic material.
on the user willingly activating the elevated privileges.
15
The Rise of Android Ransomware
deactivate Device Admin for the malware, they will fail because the
trojan has already registered a call-back function to reactivate the The malware will not succeed in killing or removing ESET Mobile
privileges immediately after removal is attempted. Security. Lockerpin attempts to kill the com.android.settings process
in order to prevent standard uninstallation of the malware through
Similar to when Device Administrator is Android’s built in application manager.
first activated by the trojan, if a removal
attempt is made, the Device Administrator
JISUT
window is again overlaid with a bogus
window as shown in Figure 22. Pressing The ransomware that ESET security solutions flag as Android/LockScreen.
Continue effectively reactivates the Jisut is a strange family. Unlike the rest of the examples described in this
elevated privileges. paper, the purpose of which is purely financial gain, Jisut appears to also
have been created as a prank.
16
The Rise of Android Ransomware
The first variants of Android/LockScreen.Jisut started appearing in the Another Jisut variant asks the user to click a button that says "I am an
first half of 2014. Since then, we have detected hundreds of variants that idiot" 1000 times. Nothing happens after the counter reaches 1000; it’s
all behave somewhat differently or display different ransom messages, reset to zero and the frustrated user can continue clicking indefinitely.
but are all based on the same code template. The whole Jisut malware
family is unlike any other known LockScreen ransomware.
Figure 24 – Jisut prank messages: Left: “Off, you are dead!” Right: “I hope you have fun!
Producer Shen Shen”
17
The Rise of Android Ransomware
18
The Rise of Android Ransomware
Rooted Android phones have even more options. A factory reset, which stopping attackers (the same ones or others) from coming back for
will delete all data on the device, can be used as the last resort in case more.
no MDM solutions are available.
Taking the wider view of the whole ransomware economy, giving in to
If files on the device have been encrypted by crypto-ransomware the attackers’ demands only fuels the problem.
such as Android/Simplocker, we advise users to contact their security
provider’s technical support. Depending on the specific ransomware As mentioned above, prevention by adhering to basic security principles,
variant, decrypting the files may or may not be possible. using updated security software on Android, and backing up your data
(not only on the device itself) is a much more sensible option. And with
We advise affected users against paying the requested ransom, for all of those precautions being readily available and easy to use, there
several reasons. While it is true that some established Windows crypto- really is no reason not to do so.
ransomware gangs have reached the level of professionalism where
users will usually get their files decrypted, that is not always the case.
File-encrypting crypto-ransomware is extremely popular among
malware writers and there are many different families of Windows
Filecoders (the ESET detection name for the category). Many of them
have jumped on to the ransomware bandwagon, hoping to copy the
success of Cryptolocker and the like, but our technical analyses of all
those families has shown that many of them are implemented poorly.
For users, this means two things: Firstly, that even if they do pay up,
their files may not get decrypted. Secondly, that it may be possible to
decrypt their files without paying.
19