New Android Ransomware Found Spreading via SMS Messages, Lures Victims by Pretending to Be Porn

The new ransomware is believed to have been active since at least July 12.

Advertisement
By Jagmeet Singh | Updated: 1 August 2019 18:49 IST
Highlights
  • The ransomware is dubbed Android/Filecoder.C
  • It demands a ransom ranging between $98 to $188
  • The malicious app comes from forum posts highlighting adult content

New Android ransomware is said to have 42 different language versions of a single message

A new family of Android ransomware has been discovered that goes deeper into devices by using SMS messaging, according to security researchers. The ransomware, dubbed Android/Filecoder.C, has largely been distributed through various online forums, including XDA Developers and Reddit. Mostly, the attackers have been spotted luring potential victims into downloading adult content from suspicious links that set the pitch for the ransomware attack and demand a ransom ranging between $98 to $188 (roughly Rs. 6,800 to Rs. 13,000).

Security researchers at ESET have reported the arrival of the Android/Filecoder.C ransomware that is being transmitted through malicious apps. The malicious app links have been spotted by the researchers on some forum posts that were mostly related to porn content.

Once the infected apps are installed, the ransomware, which is believed to be active since at least July 12, attempts to spread via SMS messages that it sends to the victim's contact list. The messages contain links to the ransomware to increase the interest of potential victims, and each of the links is advertised as an app that uses the photos of the recipient, the security researchers note in a blog post.

Advertisement

The ransomware is also said to have 42 different language versions of the single message template that it chooses depending on the language settings of the infected device. The researchers have also mentioned that once the link available in the sent message is clicked, the malicious app is installed. The app often displays a sex simulator, though it silently spreads malicious messages and implements the encryption or decryption in the background.

Advertisement

"The ransomware has the ability to send text messages, due to having access to the user's contact list. Before it encrypts files, it sends a message to each of the victim's contacts," the researchers said in the post.

Once it completes the message sending process, the ransomware goes through the files available on the accessible storage and then encrypts most of them. The app that brings the ransomware includes hardcoded command-and-control (C2) settings and Bitcoin wallet addresses that are used to process ransom. Also, the attackers use Pastebin as a conduit to dynamically retrieve the information from the source code.

Advertisement

The ransomware is claimed to encrypt various file types, including general text files and images. However, it doesn't grab typical Android extensions such as .apk and .dex as well as compressed files that are based on .zip and .rar formats.

Android/Filecoder.C ransomware encrypts specific files to demand ransom
Photo Credit: WeLiveSecurity

Advertisement

 

According to the researchers, the encryption list of the latest Android ransomware looks identical to what was associated with Windows-focussed WannaCry.

Instead of completely blocking access to the device, Filecoder.C encrypts specific content and displays the ransom note. It also generates a public and private key pair where the private key is encrypted with an RSA algorithm and a hardcoded value. This enables the attacker to remotely decrypt the private key once it receives the demanded ransom amount from the victim.

Users are recommended to download apps from Google Play to avoid chances of being attacked. Also, it is advisable to avoid tapping unknown links and keep the devices up to date.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. Xiaomi's HyperOS 3 Update Is Rolling Out to These Phones, Tablets
  2. Redmi Note 15 5G Chipset Revealed Ahead of January 6 India Launch
  3. Realme 16 Pro to Launch With Urban Wild Design in These Four Colourways
  4. OpenAI Says ChatGPT Will Soon Become an Operating System
  5. Honor Power 2 Key Features Leaked; Could Launch With a 10,080mAh Battery
  6. Dhruv64: India's First Homegrown 64-Bit Dual-Core Microprocessor Unveiled
  7. Nothing Phone 3a Lite Review: The Best Mid-Range Design
  8. Realme Narzo 90 Series With 7,000mAh Battery Launched in India: See Pricing
  1. Google and ChatGPT Remain the Most Popular Services as Internet Traffic Grows by 19 Percent: Cloudflare
  2. HyperOS 3 Update Rolls Out to Xiaomi 14, Redmi Note 14 5G and More Devices With Android 16, New AI Features
  3. iOS 26.3 Beta 1 Reportedly Adds Transfer Tool for Switching to Android, Notification Forwarding for Wearables
  4. OpenAI Hires New Head of App Platform to Turn ChatGPT Into an Operating System
  5. Honor Power 2 Chipset, Display Specifications Tipped; Could Launch With 10,080mAh Battery
  6. Hollow Knight: Silksong's First Major Expansion, Sea of Sorrow, Announced; Launch Set for 2026
  7. Oppo Find X9 Ultra Battery Capacity Teased By Company Executive: Here's What We Know So Far
  8. Dhruv64: India’s First Homegrown 64-Bit Dual-Core Microprocessor Unveiled
  9. Disney CEO Says AI Deal With OpenAI Is Exclusive For Just One Year: Report
  10. Arasayyana Prema Prasanga Streaming Online: Know Where to Watch This Kannada Film
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.