Casa > ransomware > Android Ransomware Gets Smarter, Escapa da detecção

Ransomware Android fica mais esperto, Escapa da detecção

New Android ransomware has been discovered, and apparently no mobile antivirus program has been able to detect it. The ransomware was discovered in a popular app called “OK”, a Russian-based entertainment social network app available in Google Play store. Curiosamente, the app in this official store is completely clean and app has between 50 e 100 milhões de instalações. The app in third party app stores, Contudo, is not.

relacionado: O primeiro celular Doxware Ransomware App para Android

Zscaler researchers dizer that the Android malware stays silent for the first four hours after installation, thus enabling the original app to operate without interruptions. This method allows the ransomware to bypass detection by AV engines. Once the four hours are over, users will be shown a prompt to add a device admin. This allows the app to change the screen unlock password, monitor screen-unlock attempts, lock the screen and set lock-screen password expiration.

Infelizmente, pressing the Cancel button doesn’t help as the prompt quickly reappears, thus preventing user from any action, uninstalling the app inclusive. além disso, by pressing the Activate button the screen gets locked and a full-screen ransom note is displayed.

The researchers analyzed the ransomware to make sure whether it sends the victim’s data to a server. They didn’t find any personal data leak as claimed in the ransom’s note. além do que, além do mais, the ransomware turned out incapable of unlocking the user’s phone.

Regardless of whether the user transfers the requested ransom amount to the attacker’s e-wallet, the ransomware will not stop operating. As soon as phone screen is locked, the malware will notify its Command & Ao controle (C&C) server about the new victim. Curiosamente, there is no functionality present in the malware to confirm whether the user has paid the ransom or not and it, Portanto, continues to operate.

How Does the Ransomware Evade AV Detection?

After the researchers analyzed how clean apps such as the Russian OK app became infected, they realized that the threat author has created an automated method for infecting multiple apps through the same method.

disse brevemente, most AV engines execute samples for a few seconds or minutes to detect malicious behavior associated with an app. Nesse caso, the ransomware didn’t show its presence for four hours. Deste jeito, the malware author evaded the dynamic analysis by antivirus systems. “Considering the stealth tactics designed into this sample, it wouldn’t be difficult to imagine the author successfully uploading this ransomware to the Google Play Store”, pesquisadores acrescentam.

relacionado: Android Permissões e App Seu (do telefone) Privacidade


Infected users should boot their devices into Safe Mode, this way disabling third-party applications. Then they should remove the device admin privilege of the infected app, uninstall the app and re-boot the device back to normal mode.

Security tip: To minimize the risk of such infections, go to Security settings/Device administration and de-select “Unknown sources.”

Milena Dimitrova

Milena Dimitrova

Um escritor inspirado e gerente de conteúdo que está com SensorsTechForum desde o início do projeto. Um profissional com 10+ anos de experiência na criação de conteúdo envolvente. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *