Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/20/2017
04:15 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Mobile Ransomware Hits Browsers with Old-School Techniques

Several types of malware sold on the dark Web advertise the ability to spy on Android smartphones, encrypt files, and demand payment.

Mobile devices are not immune to ransomware. Researchers anticipate smartphones and tablets increasingly will be targeted as spying and information theft capabilities are becoming more widely available in the dark Web.

Researchers from SecureWorks' Counter Threat Unit (CTU) discovered 200 new ransomware variants last year, a 122% increase from the year prior. There is potential for mobile ransomware to become a significant threat, according to the firm's new 2017 State of Cybercrime Report.

CTU researchers found several types of malware for sale, some advertising the ability to spy on all functions of an Android phone as well as to encrypt files and demand payment, the hallmark of a ransomware attack. One malicious Android package kit (APK) file, containing a bot and ransomware, sells for about $1,000 USD on Russian-speaking forums.

Android devices are at greatest risk for users downloading applications that could potentially be malicious because users can access third-party markets (not Google Android's) where anyone can upload an app. 

"By virtue of Google's decision to make a semi-open ecosystem, it's inevitable they're going to be most at risk for these types of applications," says Keith Jarvis, senior security researcher with SecureWorks' CTU. That said, most mobile ransomware threats are browser-based and affect any device with a built-in browser, he adds.

Mobile ransomware geared toward individuals is a less targeted and smaller-value approach than ransomware targeting businesses - but it could also prove more effective. Individuals don't have the security knowledge and resources businesses have to defend against ransomware.

"What a lot of people are seeing on mobile is ransomware we saw before 2013 - for example, scareware and popups in the browser saying 'You've got a virus,'" Jarvis explains. "It locks the screen, encrypts files, demands payment."

Browser-based threats can't access many facilities on the devices, which is why attackers rely on old techniques like screen freezing. Researchers also saw an increase in SMS phishing, where threats arrive via text. Banking malware Exobot, for example, is a malware/spyware combination targeting Android with SMS messages containing malicious links.

With the rise of SMS phishing and advanced exploit kits, researchers expect there could be a rise of attacks focused on encrypting Android devices and leaving victims with no access to contacts, photos, or other personal information.

While mobile ransomware is a threat to the enterprise, Jarvis says organizations should continue to focus more on desktop-based ransomware. Most employees store business-critical data on their computers and until they begin to do the bulk of their work on smartphones and tablets, their desktops and laptops will be at greatest risk.

"That shift is going to have to happen," he notes. "Corporations will ask workers to be more mobile."

Threats in your inbox

It's expensive to develop exploits for Internet Explorer or Microsoft Edge. As a result, hackers are turning to social engineering and spam, which Jarvis describes as "the most economical way to reach potential victims.

"It's more about the behavioral aspect," he explains. "People are always tempted to double-click, to view something that comes through their email."

A related finding from the report is the growth of business email compromise (BEC) and business email spoofing (BES), which generated $5 billion USD in global losses between October 2013 and December 2016. In May 2017, the FBI stated victims' losses related to BEC and BES went up 2,370% between January 2015 and December 2016.

Both types of attacks have become more prolific as attackers look for ways to defraud increasingly security-savvy employees.

BEC attacks generated $5.3 billion in global losses between 2013 and 2017, Trend Micro researchers reported earlier this year. Attackers are turning to old BEC techniques, frequently spoofing the company's CEO and sending fake emails to heads of finance to request money.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
martin.george
50%
50%
martin.george,
User Rank: Apprentice
9/25/2017 | 11:15:32 AM
Cool
That is so cool written) I can't say something bad about your article 
samairakhan917
50%
50%
samairakhan917,
User Rank: Apprentice
10/20/2017 | 8:53:21 AM
Relationship
Glorious article, it was amazingly helpful! I just began in this and   I'm ending up more comfortable with it better! Cheers, keep doing astounding! 

 
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
Kelly Sheridan, Staff Editor, Dark Reading,  1/10/2020
Will This Be the Year of the Branded Cybercriminal?
Raveed Laeb, Product Manager at KELA,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3683
PUBLISHED: 2020-01-17
The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and...
CVE-2019-3682
PUBLISHED: 2020-01-17
The docker-kubic package in SUSE CaaS Platform 3.0 before 17.09.1_ce-7.6.1 provided access to an insecure API locally on the Kubernetes master node.
CVE-2019-17361
PUBLISHED: 2020-01-17
In SaltStack Salt through 2019.2.0, the salt-api NEST API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
CVE-2019-19142
PUBLISHED: 2020-01-17
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.
CVE-2019-19801
PUBLISHED: 2020-01-17
In Gallagher Command Centre Server versions of v8.10 prior to v8.10.1134(MR4), v8.00 prior to v8.00.1161(MR5), v7.90 prior to v7.90.991(MR5), v7.80 prior to v7.80.960(MR2) and v7.70 or earlier, an unprivileged but authenticated user is able to perform a backup of the Command Centre databases.