Android ransomware downloads malicious apps that lock your device

Security firm discovers app-downloading exploit kit

A new breed of Android malware that automatically downloads malicious apps was uncovered by security researchers after it attacked one of their company's test devices.

The exploit kit, which is the first stage of the attack, is delivered via a malicious ad on a website (also known as malvertising) that contains hostile Javascript, according to security firm Blue Coat.

The kit then installs ransomware masquerading as an app onto the Android device.

This ransomware executes automatically at a time of the malware author's choosing. When executed, it poses as a message from fake law enforcement agency Cyber.Police, with the seals of the FBI and NSA also displayed to give it an additional level of credibility.

Advertisement - Article continues below

This veneer of credibility is almost immediately undermined, however, as it demands payment in iTunes gift cards.

The malware itself is in fact quite crude - rather than encrypting the whole device and all the files contained on it, as most modern ransomware does, it instead simply locks it.

While quite old fashioned in this respect, Blue Coat researcher Andrew Brandt said this was the first time "an exploit kit has been able to successfully install malicious apps on a mobile device without any user interaction on the part of the victim".

"During the attack, the device did not display the normal 'application permissions' dialog box that typically precedes installation of an Android application," he said in a blog post.

In consultation with another researcher, Joshua Drake of Zimperium, it was determined that the malicious Javascript used at the beginning of the attack "contains an exploit against libxslt that was leaked during the Hacking Team breach".

"The commoditised implementation of the Hacking Team ... exploits to install malware onto Android mobile devices using an automated exploit kit has some serious consequences," said Brandt.

"The most important of these is that older devices, which have not been updated (nor are likely to be updated) with the latest version of Android, may remain susceptible to this type of attack in perpetuity. That includes so-called media player devices - basically inexpensive, Android-driven video playback devices meant to be connected to TVs - many of which run the 4.x branch of the Android OS," he added.

While there is little a user can do to protect against the attack if they are unable to upgrade from a vulnerable operating system, they can take mitigating steps by regularly backing up their device.

That way, if they are attacked by this malware or others, they can reset the device to factory default and restore from backup without losing very much or any data.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now



How can you protect your business from crypto-ransomware?

4 Nov 2019

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019

Best ransomware removal tools

7 Dec 2018

Best antivirus for Windows 10

3 Sep 2019

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019