Hirunews Logo
HiruNews
HiruNews
HiruNews
Dangers+of+%22Double+Locker%22+ransomware+revealed
Thursday, 19 October 2017 - 20:41
Dangers of "Double Locker" ransomware revealed
32

Shares
3,880

Views
Smartphone users be cautious....

Detected by ESET products as Android/DoubleLocker.A, the ransomware is based on the foundations of a particular banking Trojan, known for misusing accessibility services of the Android operating system.

However, DoubleLocker doesn’t have the functions related to harvesting users’ banking credentials and wiping out their accounts.

Instead, it has received two powerful tools for extorting money from its victims.

DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them – a combination that has not been seen previously in the Android ecosystem.

“Given its banking malware roots, DoubleLocker may well be turned into what could be called ransom-bankers. Two-stage malware that first tries to wipe your bank or PayPal account and subsequently locks your device and data to request a ransom… Speculation aside, we spotted a test version of such a ransom-banker in the wild as long ago as May 2017,” comments Lukáš Štefanko, the ESET malware researcher who discovered DoubleLocker.

DoubleLocker spreads in the very same way as its banking parent does. It is distributed mostly as a fake Adobe Flash Player through compromised websites.

Once launched, the app requests activation of the malware’s accessibility service, named “Google Play Service”. After the malware obtains the accessibility permissions, it uses them to activate device administrator rights and set itself as the default Home application, in both cases without the user’s consent.

“Setting itself as a default home app – a launcher – is a trick that improves the malware’s persistence. Whenever the user clicks on the home button, the ransomware gets activated and the device gets locked again. Thanks to using the accessibility service, the user doesn’t know that they launch malware by hitting Home,” explains Štefanko.

First, it changes the device’s PIN, effectively blocking the victim from using it. The new PIN is set to a random value which the attacks neither store nor send anywhere, so it’s impossible for the user or a security expert to recover it. After the ransom is paid, the attacker can remotely reset the PIN and unlock the device.

Second, DoubleLocker encrypts all files from the device’s primary storage directory. It utilizes the AES encryption algorithm, appending the extension “.cryeye”. “The encryption is implemented properly, which means that, unfortunately, there is no way to recover the files without receiving the encryption key from the attackers,” says Štefanko.

Make a Comment
Make a Comment

DOWNLOAD HIRUNEWS APP ON ANDROID & APPLE
You may also like :
HiruNews
Thursday, 16 August 2018 - 16:24
Mangroves play a critical role in maintaining the ecological balance in Sri Lanka's coastal areas.However, some money-hungry people do not understand this.Our... Read More
HiruNews
News Image
Hiru News Programme Segments
HiruNews
HiruNews
HiruNews
HiruNews
HiruNews
HiruNews
HiruNews
HiruNews
HiruNews
1,692 Views
HiruNews
HiruNews
HiruNews
827 Views
HiruNews
HiruNews
HiruNews
6,615 Views
HiruNews
HiruNews
HiruNews
16,601 Views
HiruNews
HiruNews
HiruNews
30 Views
HiruNews
HiruNews
HiruNews
44,939 Views
Top