Attacks/Breaches
9/20/2017
04:15 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Mobile Ransomware Hits Browsers with Old-School Techniques

Several types of malware sold on the dark Web advertise the ability to spy on Android smartphones, encrypt files, and demand payment.

Mobile devices are not immune to ransomware. Researchers anticipate smartphones and tablets increasingly will be targeted as spying and information theft capabilities are becoming more widely available in the dark Web.

Researchers from SecureWorks' Counter Threat Unit (CTU) discovered 200 new ransomware variants last year, a 122% increase from the year prior. There is potential for mobile ransomware to become a significant threat, according to the firm's new 2017 State of Cybercrime Report.

CTU researchers found several types of malware for sale, some advertising the ability to spy on all functions of an Android phone as well as to encrypt files and demand payment, the hallmark of a ransomware attack. One malicious Android package kit (APK) file, containing a bot and ransomware, sells for about $1,000 USD on Russian-speaking forums.

Android devices are at greatest risk for users downloading applications that could potentially be malicious because users can access third-party markets (not Google Android's) where anyone can upload an app. 

"By virtue of Google's decision to make a semi-open ecosystem, it's inevitable they're going to be most at risk for these types of applications," says Keith Jarvis, senior security researcher with SecureWorks' CTU. That said, most mobile ransomware threats are browser-based and affect any device with a built-in browser, he adds.

Mobile ransomware geared toward individuals is a less targeted and smaller-value approach than ransomware targeting businesses - but it could also prove more effective. Individuals don't have the security knowledge and resources businesses have to defend against ransomware.

"What a lot of people are seeing on mobile is ransomware we saw before 2013 - for example, scareware and popups in the browser saying 'You've got a virus,'" Jarvis explains. "It locks the screen, encrypts files, demands payment."

Browser-based threats can't access many facilities on the devices, which is why attackers rely on old techniques like screen freezing. Researchers also saw an increase in SMS phishing, where threats arrive via text. Banking malware Exobot, for example, is a malware/spyware combination targeting Android with SMS messages containing malicious links.

With the rise of SMS phishing and advanced exploit kits, researchers expect there could be a rise of attacks focused on encrypting Android devices and leaving victims with no access to contacts, photos, or other personal information.

While mobile ransomware is a threat to the enterprise, Jarvis says organizations should continue to focus more on desktop-based ransomware. Most employees store business-critical data on their computers and until they begin to do the bulk of their work on smartphones and tablets, their desktops and laptops will be at greatest risk.

"That shift is going to have to happen," he notes. "Corporations will ask workers to be more mobile."

Threats in your inbox

It's expensive to develop exploits for Internet Explorer or Microsoft Edge. As a result, hackers are turning to social engineering and spam, which Jarvis describes as "the most economical way to reach potential victims.

"It's more about the behavioral aspect," he explains. "People are always tempted to double-click, to view something that comes through their email."

A related finding from the report is the growth of business email compromise (BEC) and business email spoofing (BES), which generated $5 billion USD in global losses between October 2013 and December 2016. In May 2017, the FBI stated victims' losses related to BEC and BES went up 2,370% between January 2015 and December 2016.

Both types of attacks have become more prolific as attackers look for ways to defraud increasingly security-savvy employees.

BEC attacks generated $5.3 billion in global losses between 2013 and 2017, Trend Micro researchers reported earlier this year. Attackers are turning to old BEC techniques, frequently spoofing the company's CEO and sending fake emails to heads of finance to request money.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance & Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
martin.george
50%
50%
martin.george,
User Rank: Apprentice
9/25/2017 | 11:15:32 AM
Cool
That is so cool written) I can't say something bad about your article 
samairakhan917
50%
50%
samairakhan917,
User Rank: Apprentice
10/20/2017 | 8:53:21 AM
Relationship
Glorious article, it was amazingly helpful! I just began in this and   I'm ending up more comfortable with it better! Cheers, keep doing astounding! 

 
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Oracle Product Rollout Underscores Need for Trust in the Cloud
Kelly Sheridan, Associate Editor, Dark Reading,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.