Nasty Police Scareware Triples Ransom If Users Triy to Unlock Device on Their Own

Status
Not open for further replies.

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Few options at hand as screen is locked, buttons don't work
A stubborn piece of police scareware holds Android devices hostage until a fee is paid via Money Pak and PayPal My Cash transfers, and it increases the ransom to $1,500 / €1,400 if users attempt to unlock the device on their own.

The nasty threat arrives via an email message claiming to deliver an update for Adobe Flash Player and immediately after installation it plasters a fake FBI warning on the screen and locks the device, motivating the action with a claim that the user accessed websites featuring adult content.

Ransom jumps from $500 to $1,500
To make the message more credible, the attackers attach screenshots of the browsing history and warns that a picture of the victim has also been taken, suggesting that they can be identified.

Initially, the ransom for unlocking the device is $500 / €460 but it triples up if the victim tries to get out of the jam on their own, Romanian antivirus vendor Bitdefender says in a blog post on Tuesday.

Telemetry data gathered by the company from its systems revealed that last week more than 15,000 email messages carrying the malware piece were detected.

Users need to remove malware via ADB
The threat is detected as Android.Trojan.SLocker.DZ and it is considered one of the most prevalent forms of ransomware, as it is frequently updated by its authors in an effort to evade detection.

Bitdefender says that the malicious emails are sent from servers located in Ukraine. The messages come from addresses with different top-level domains, .edu, .com, .org and .net being among them.

According to the researchers, once the scare message is shown on the home screen of the device, there is little the user can do to get rid of it and the procedure requires having the Android Data Bridge (ADB) command line tool already activated at the moment of the infection.

ADB enables communication and control of the device from a computer, over an USB connection. This way the malware can be removed. However, this process requires certain technical skills.
 
  • Like
Reactions: DardiM and frogboy

Jack

Administrator
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
A stubborn piece of police scareware holds Android devices hostage until a fee is paid via Money Pak and PayPal My Cash transfers, and it increases the ransom to $1,500 / €1,400 if users attempt to unlock the device on their own.

The nasty threat arrives via an email message claiming to deliver an update for Adobe Flash Player and immediately after installation it plasters a fake FBI warning on the screen and locks the device, motivating the action with a claim that the user accessed websites featuring adult content.

Ransom jumps from $500 to $1,500
To make the message more credible, the attackers attach screenshots of the browsing history and warns that a picture of the victim has also been taken, suggesting that they can be identified.

Initially, the ransom for unlocking the device is $500 / €460 but it triples up if the victim tries to get out of the jam on their own, Romanian antivirus vendor Bitdefender says in ablog post on Tuesday.

Telemetry data gathered by the company from its systems revealed that last week more than 15,000 email messages carrying the malware piece were detected.

Read more: http://news.softpedia.com/news/Nast...iy-to-Unlock-Device-on-Their-Own-482369.shtml
 

Jack

Administrator
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
If only everyone would make regular backups. ;):(
It's even more simple... This Android malware is installed via malicious apps, so all the user would need to do is not install the app or at least read the privileges that it asks. When an app is asking for "Administrator Rights" this should really make everyone be suspicious..

This post from Kafeine explains how this scam works:

Traffic is coming from ExoClick, EroAdvertising, Plugrush etc...so mostly badvert.



Advices on how to install the PornDroid "Video Player" or
How to get SocEng and Ransomed
But it seems that in the last move (this week) they switched to a Browlock style landing prompting repeatedly to install the downloaded "video player"



Piece of code of last version of the PornDroid Landing

Alert now shown by the Landing


The ransomware is not grabbing the fake page via external call anymore. Content is embedded in the APK which explain why it's "meaty": 1Mo.


Permissions changed a little


+ Find Accounts on the Device
+ modify the contents of the SD card
- Read your Text message
- Read Bookmark and History


Identical to previous post

The explanation for "Administrator Rights" prompt has been tuned to:

XXX Video (PornDroid) prompting for Administrator Rights. Reason ?
"Set Storage Encryption"
If you accept the malware is launched immediately.

Screen lock after click on any video is the same :



Source: http://malware.dontneedcoffee.com/2015/01/inside-android-lockout-system-aka.html
 

comfortablynumb15

Level 7
Verified
May 11, 2015
326
Hell, the moment I get an email telling me about a Flash update is when their gig would meet a swift end. But yeah, people need to be watching the Play store and stuff. That place is stuffed to the gills with suspicious "apps".
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top