Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

10/9/2020
04:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Latest Version of MalLocker Android Ransomware Packs New Tricks

Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.

Security researchers at Microsoft have spotted a dangerous new version of MalLocker, a constantly evolving Android ransomware family that has been floating around in the wild since at least 2014.

The new version is notable for how it surfaces the ransom demand on infected devices and its integration of an open source machine-learning module for context-aware cropping of the ransom note, depending on screen size. The latest variant of MalLocker also uses a new obfuscation method to hinder code analysis and to evade detection by anti-malware tools.

Related Content:

'Unkillable' Android Malware App Continues to Infect Devices Worldwide

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

In a report this week, Microsoft described MalLocker as being distributed via arbitrary websites and online forums, or hidden in popular apps and video players for mobile devices. Like many other Android ransomware variants, the new MalLocker does not actually encrypt data on infected devices. Instead, it attempts to prevent users from using an infected device by displaying a ransom note over every window. Regardless of what button the user clicks, the ransom note remains on top of all other windows.

What is different in the new MalLocker variant is the manner in which it achieves this persistence. Previous Android ransomware tools took advantage of a system alert feature in the OS to display the ransomware note. But that has become almost impossible to do now because of certain platform-level changes that Google has implemented to thwart the abuse, Microsoft said.

The new variant instead abuses two other functions that are present in recent versions of Android. "First, it sets its notification as a very important notification requiring immediate user attention," says Tanmay Ganacharya, partner director, security research, at Microsoft. "This notification is wired to pop up the ransom notice," he says.

Second, the malware is designed to ensure that this notification is always displayed when the user tries to do other activities or performs other functions. "It does this by using a callback, which is a way for functions to pass a piece of code to each other," Ganacharya says.

On Android, a callback is a way for one function to let another function know that an action — such as a user pressing the Home button — is completed, he notes. The new version of MalLocker is designed to take advantage of the callback method to know when a user might have completed a specific action so it can promptly display the ransom note. "This means that whatever the user does, the ransomware's notification is always displayed, effectively preventing the user from performing any other action," Ganacharya says.

In addition, the new version of MalLocker also incorporates an open source machine-learning module that lets it know an infected device's screen size so the ransom note can be automatically resized and cropped to fit it without distortion.

According to Microsoft, the new Android malware's obfuscation tactics are also noteworthy. The manner in which the malware authors have encrypted and hidden the payload, the decryption routine it uses and the presence of lots of deliberately introduced junk code all make the malware hard to analyze and detect, Microsoft said.

Users with infected devices can try rebooting the system in safe mode and then uninstalling the malware, Microsoft said.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16632
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
CVE-2021-32073
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.