Active Drive-By Attack Forcing Android Users to Install Ransomware: Report

Advertisement
By Gadgets 360 Staff | Updated: 1 August 2016 15:51 IST
Highlights
  • It's being called the first of its kind "in-the-wild drive-by-download attack."
  • The ransomware once installed on an Android device locks down the device.
  • One way to bypass the ransomware is to factory reset the Android device.
Android is no strange to ransomware, and a newly discovered drive-by attack is installing ransomware on Android devices running older versions of Android. It is said to be the "first in-the-wild drive-by-download attack that exploits a chain of vulnerabilities to target Android users." While the ransomware that gets installed is almost archaic in its methodology, the "commoditised implementation" of several previous exploits in an active exploit kit is a significant wake up call, as a large number of users with older Android versions can be infected with no real recourse.

Discovered by Blue Coat Labs, the exploit kit uses a hostile JavaScript that was leaked when Hacking Team was breached last year, and its treasure trove of hacking tools was put online. Its origins were ascertained by Zimperium's Joshua Drake, when consulted by Blue Coat Labs. The drive-by-download attack forces the device to download and execute an Executable and Linkable Format (ELF) file when visiting a malicious webpage. The file in turn exploits the Towelroot vulnerability (patched by Google in Android 4.4 KitKat) from 2014 to install the Cyber.Police ransomware without raising any install permissions dialogues by using root privileges.

The ransomware is crude in comparison to today's crytpo-ransomware, and does not encrypt the data it is holding hostage. After gaining elevated privileges, the ransomware halts other apps and system processes, leaving users with a locked Android device. In order to unlock the device, the ransomware demands payment - which in this case is two $100 Apple iTunes gift card codes. These transactions of course can be tracked, while most modern ransomware demand payment in Bitcoins - which are virtually impossible to track.

So far, the hostile JavaScript was found in advertisements on porn sites, including some which were created less than a month ago. There's of course no telling where else the script can show up. Blue Coat Labs says only two antivirus companies currently classify the ELF payload as dangerous.

Advertisement

As per Blue Coat Labs, at least 224 infected devices have been found thus far, including a few running Android 4.4 KitKat, implying that a different set of vulnerabilities is being exploited to install the ransomware on those devices with the newer Android version. As per Google's own numbers - 23.5 percent of active Android devices run Android 4.0 Ice Cream Sandwich to Android 4.3 Jelly Bean. Even if one does not count the 33.4 percent of active devices that run Android 4.4 KitKat as vulnerable, it means that a significant proportion of the over 1 billion Android device users are vulnerable. The attack has been in the wild since mid-February, Blue Coat Labs says.

Advertisement

Andrew Brandt of Blue Coat Labs writes, "This is the first time, to my knowledge; an exploit kit has been able to successfully install malicious apps on a mobile device without any user interaction on the part of the victim. During the attack, the device did not display the normal "application permissions" dialog box that typically precedes installation of an Android application."

Detailing the Cyber.Police ransomware, Brandt says, "It presents itself as a sort of law enforcement or intelligence agency intervention into your browsing habits. The purveyor of the scam claims to be the American national security agency or Nation security agency," explains the firm. Notably, the ransomware was first reported in December last year.

Advertisement

The ransomware after being malicious installed on the Android device show a plain text saying, "Update now. Please read! Do not turn off or reboot your phone during update. Please try again later." Blue Coat Lab after some digging found that the malware's internal name is "net.prospectus." As expected from ransomware, it kills all installed apps on the device and even prevents new app launch.

As the ransomware is crude and does not encrypt the Android device's data after taking control of it, users can still copy their data via a PC, before performing a factory reset to remove the ransomware. But as we mentioned, the method of the exploit kit is significant, as it can be used to affect millions of devices running older versions of Android that have no hope of an update lined up for them.

Advertisement

Apart from taking regular backups of important data on your Android device, Blue Coat Labs suggest using an up-to-date browser instead of an inbuilt browser on the Android device.

Leaving us with the significance of the exploit, Brandt says, "The commoditized implementation of the Hacking Team and Towelroot exploits to install malware onto Android mobile devices using an automated exploit kit has some serious consequences. The most important of these is that older devices, which have not been updated (nor are likely to be updated) with the latest version of Android, may remain susceptible to this type of attack in perpetuity. That includes so-called media player devices -- basically inexpensive, Android-driven video playback devices meant to be connected to TVs -- many of which run the 4.x branch of the Android OS. Some of these older Android devices are now in the same situation as PCs running Windows XP: The OS may still work, despite no longer receiving updates, but using it constitutes a serious risk of infection."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Cloudflare Is Down Again For the Second Time in Weeks: See Affected Sites
  2. ACT Fibernet Launches New Broadband Plans With Free OTT Subscriptions
  3. Flipkart Buy Buy 2025 Sale: Nothing Phone 3, Phone 3a Deals Revealed
  4. OnePlus 15R Surfaces on Benchmarking Site Ahead of India Launch
  5. HMD 101, HMD 100 With Built-In Radio Launched in India at These Prices
  6. Airtel Discontinues These Prepaid Recharge Packs in India
  7. Motorola Edge 70 With Pantone's 2026 Colour, Swarovski Crystals Launched
  8. Nothing Phone 3a Lite Goes on Sale in India at This Price
  9. Anthropic's New Claude Tool That Interviews Users About Their AI Usage
  10. OTT Releases of the Week (Dec 1 – Dec 7): Know What to Watch
  1. Google’s Year in Search 2025: Top Trending Topics in India—From Gemini to Squid Games
  2. Vivo S50 Colour Options, Key Features Surface Online; Could Launch in India as Vivo V70
  3. CFTC Clears Path for Spot Crypto Trading on Regulated Platforms for the First Time
  4. Cloudflare Outage Blocks Access to Several Websites Including BookMyShow, SpaceX, Coinbase
  5. Samsung Galaxy S26 Series to Offer Built-In Support for Company's 25W Magnetic Qi2 Charger: Report
  6. Airtel Discontinues Two Prepaid Recharge Packs in India With Data Benefits, Free Airtel Xtreme Play Subscription
  7. Samsung Galaxy Phones, Devices Are Now Available via Instamart With 10-Minute Instant Delivery
  8. NotebookLM App Gets an In-Built Camera, Lets Users Upload Images as a Source
  9. HMD 101 Launched in India With 1,000mAh Battery, Auto Call Recording Alongside HMD 100: Price, Features
  10. Crypto Traders Await US Fed Signals as Bitcoin Price Drops to $91,900
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.