New Android Ransomware Found Spreading via SMS Messages, Lures Victims by Pretending to Be Porn

The new ransomware is believed to have been active since at least July 12.

Advertisement
By Jagmeet Singh | Updated: 1 August 2019 18:49 IST
Highlights
  • The ransomware is dubbed Android/Filecoder.C
  • It demands a ransom ranging between $98 to $188
  • The malicious app comes from forum posts highlighting adult content

New Android ransomware is said to have 42 different language versions of a single message

A new family of Android ransomware has been discovered that goes deeper into devices by using SMS messaging, according to security researchers. The ransomware, dubbed Android/Filecoder.C, has largely been distributed through various online forums, including XDA Developers and Reddit. Mostly, the attackers have been spotted luring potential victims into downloading adult content from suspicious links that set the pitch for the ransomware attack and demand a ransom ranging between $98 to $188 (roughly Rs. 6,800 to Rs. 13,000).

Security researchers at ESET have reported the arrival of the Android/Filecoder.C ransomware that is being transmitted through malicious apps. The malicious app links have been spotted by the researchers on some forum posts that were mostly related to porn content.

Advertisement

Once the infected apps are installed, the ransomware, which is believed to be active since at least July 12, attempts to spread via SMS messages that it sends to the victim's contact list. The messages contain links to the ransomware to increase the interest of potential victims, and each of the links is advertised as an app that uses the photos of the recipient, the security researchers note in a blog post.

The ransomware is also said to have 42 different language versions of the single message template that it chooses depending on the language settings of the infected device. The researchers have also mentioned that once the link available in the sent message is clicked, the malicious app is installed. The app often displays a sex simulator, though it silently spreads malicious messages and implements the encryption or decryption in the background.

Advertisement

"The ransomware has the ability to send text messages, due to having access to the user's contact list. Before it encrypts files, it sends a message to each of the victim's contacts," the researchers said in the post.

Once it completes the message sending process, the ransomware goes through the files available on the accessible storage and then encrypts most of them. The app that brings the ransomware includes hardcoded command-and-control (C2) settings and Bitcoin wallet addresses that are used to process ransom. Also, the attackers use Pastebin as a conduit to dynamically retrieve the information from the source code.

Advertisement

The ransomware is claimed to encrypt various file types, including general text files and images. However, it doesn't grab typical Android extensions such as .apk and .dex as well as compressed files that are based on .zip and .rar formats.

Android/Filecoder.C ransomware encrypts specific files to demand ransom
Photo Credit: WeLiveSecurity

Advertisement

 

According to the researchers, the encryption list of the latest Android ransomware looks identical to what was associated with Windows-focussed WannaCry.

Instead of completely blocking access to the device, Filecoder.C encrypts specific content and displays the ransom note. It also generates a public and private key pair where the private key is encrypted with an RSA algorithm and a hardcoded value. This enables the attacker to remotely decrypt the private key once it receives the demanded ransom amount from the victim.

Users are recommended to download apps from Google Play to avoid chances of being attacked. Also, it is advisable to avoid tapping unknown links and keep the devices up to date.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. Samsung Galaxy A57 5G, Galaxy A37 5G Announced: What You Need to Know
  2. Vivo Y21 5G, Vivo Y11 5G Arrive With 6,500mAh Batteries: See Price in India
  1. Brown Dwarf Merger Could Create a New Star, Astronomers Discover
  2. OpenAI’s New ChatGPT Feature Makes It Easier to Reference Uploaded Files
  3. Gemini for Google TV Upgraded With Live Sports Scorecards and Interactive Educational Visuals
  4. Bhutan Moves 519 Bitcoin to Multiple Wallets, Including QCP Capital Link
  5. Samsung Galaxy A57 5G, Galaxy A37 5G With Triple Rear Cameras, 5,000mAh Batteries Announced: Price, Specifications
  6. Court Drops Fraud Case Against CoinDCX Founders, Says No Evidence Found
  7. Google Is Reportedly Working on Adding 3D Avatars to Gemini
  8. Xiaomi 17T Pro Listing on Thailand's NBTC Certification Site Hints at Imminent Global Launch
  9. CFTC Launches Innovation Task Force to Regulate Crypto and AI Markets
  10. Samsung Unveils 4nm Exynos 1680 Chipset With 200-Megapixel Camera, 144Hz Display Support
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.