Guest Post – New Android Ransomware Exploit

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what you can do to keep your device safe.

There’s a new troublemaker in town. Its name is AndroidOS/MalLocker.B.

MalLocker.B is the youngest but shrewdest member of a ransomware family that has a long history of holding Android devices for ransom. Like most other mobile ransomware programs, it does not encrypt victims’ files. Instead, it uses several new tricks to render the phone unusable, making it one of the most advanced mobile malware programs around.

Here’s what you need to know to keep your phone safe from the malevolent MalLocker.B.

A Family History Only Hackers Would Be Proud Of

MalLocker.B is the latest variant in a family of Android ransomware that is continually evolving. Like its predecessors, MalLocker.B displays a ransom note that covers the entire screen of infected devices. Everything underneath it cannot be seen or accessed, preventing victims from using their phones.

Typically, the hackers design the ransom note so that it looks like a notice from a local police department. It informs the victims that they committed a crime and must pay a fine, after which it provides instruction on how to do so.

In the past, cybercriminals created the ransom note by hacking the functionality behind the system alert window. The system alert window was always displayed in the foreground because it was designed to notify users about system alerts and errors. This made it ideal for the hackers’ purpose.

Eventually, Google developers made several changes to the Android operating system that eliminated the threat from this attack vector. This prompted the hackers to start using other techniques to create the ransom note (e.g., abusing Android’s accessibility services), but they weren’t as effective.

In October 2020, a new MalLocker.B variant appeared. It is the most evolved Android malware to date, according to the Microsoft researchers who found it. The ransomware:

  • Uses new techniques to display the ransom note. Specifically, MalLocker.B misuses Android’s notification services to create a call notification that displays the ransom note full screen. It then overrides an Android function that moves activities to the background. This is done to keep the ransom note in the foreground.
  • Uses a new obfuscation technique. To help the ransomware avoid detection by security solutions, part of the ransomware’s code is encrypted and stored in a folder. Once the ransomware is on the victim’s phone, the code is decrypted and executed.
  • Includes code from an open-source machine-learning module. Although the code is not being used yet, the researchers believe it will be in the future. The machine learning module automatically resizes and crops images based on screen size.

“This new mobile ransomware variant is an important discovery because the malware exhibits behaviors that have not been seen before and could open doors for other malware to follow,” according to the researchers.

What You Can Do to Protect Your Mobile Device from MalLocker.B

Although the way in which MalLocker.B displays its ransom note is unique, its distribution method is not. Cybercriminals typically hide it in video players, pirated versions of popular commercial apps, and cracked games, which they hawk in online forums and host on third-party websites.

Therefore, if you want to protect your device from MalLocker.B, you should install apps only from official app stores like Google Play. Although malicious programs sometimes find their way into these stores, the risk is much greater if you download apps from other sites.

Before you install a program from an official app store, though, you should:

  • Ask yourself “Do I really need it?” Every program you install presents a security risk, so the number of apps should be kept to a minimum.
  • Research the app. Besides looking at the program’s reviews and user ratings in the app store, perform Internet searches on the app and its developer. This research might reveal security issues.
  • Make sure your security solution is updated. That way, it can detect and block known malware.
  • Make sure your mobile device’s operating system software is updated. Updates patch known vulnerabilities, which helps reduce the number of exploitable entry points.

Finally, when you are installing a program, pay attention to the permissions. Be wary of any app that asks for permissions that seem excessive for what the program does. For example, one of MalLocker.B’s predecessors needs a special permission. To give it, you have to go through several screens and accept a warning that the app will be able to monitor your activity through Android’s accessibility services. Warnings like this should raise a red flag.


Today’s guest post is by a friend and professional peer of mine, Tony Chiappetta, owner of CHIPS.

CHIPS is a Technology Success Provider located in Shoreview, MN near the intersection of Highway 96 and Lexington.  Since 2001, CHIPS has been working with businesses to help them get the most from their technology investment.

Tony has been around technology all his life and holds numerous industry certifications.  With the completion of both a Law Enforcement and a Business Management Degree, Tony brings a business perspective to the technology landscape.  This has allowed CHIPS to lead the industry by bringing enterprise solutions down to the Small Business sector.

CHIPS has received many industry awards and accredations however, Tony is most proud that his team has been asked to help secure the Critical Infrastructure of the Twin Cities by bringing to market a proven technology that was previously only available to Federal Government Agencies.  You can follow Tony on the CHIPS blog

1

About the Author:

I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com

Comments

  1. Louis Grubin  December 11, 2020

    Wishing you happy holidays, recently completed courses in Security+, EC CouncilCND and EC Council Ethical Hacking. Yet to test for certification. Question for you on how to get into the Android system. Classes mentioned rooting but haven’t come upon any techniques or rather steps to do so. Only warnings that it voids the warranty. Also wanted to see how to expand the functionality not given with factory controls. Can you direct me to some rticles to start to learn? Also girlfriend is getting a different package to the Rockies games for next season if we have one where we can attend. Let me know if you will be in the area again.
    Lou

    reply

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.