Jump to content

Recommended Posts

Posted

LeakerLocker forgoes using encryption, instead choosing threats to make money out of victims.

 

A form of Android ransomware which threatens to send the victim's private information and web history to all of their contacts has been discovered in the official Google Play app store.

 

Uncovered by researchers at McAfee, LeakerLocker doesn't actually encrypt the victims' files, but instead claims to have made a backup of data stored on the device and threatens to share it with all of the user's phone and email contacts.

 

Those behind the malware demand $50 in exchange for not leaking personal data including photos, Facebook messages, web history, emails, location history and more, playing on fears of potential embarrassment rather than any form of cryptography.

 

Two applications in the Google Play Store contained the malware, Wallpapers Blur HD, which has been downloaded between 5,000 and 10,000 times, and Booster & Cleaner Pro, which has been downloaded between 1,000 and 5,000 times.

 

The combined number of downloads means that up to 15,000 people have fallen victim to this ransomware, which has been in the Google Play Store since at least April.

Both apps have good review scores, suggesting that those behind the scheme have been giving them fake reviews.

 

Once downloaded, LeakerLocker asks for vast swathes of permissions, including the ability to manage calls, read and send messages, and have access to contacts -- overreaching for the apps the malware is claiming to be -- before communicating with a receiver, initiating the malicious activity and locking the homescreen of the device with the extortion threat.

 

7d57ce2616b6b89b84bfb10457916add.png

 

It's true that the malware can gain access to private information -- thanks to its victims granting permissions at installation time -- but not all the private data LeakerLocker claims to have access to can be seen or leaked.

 

However, analysis of the code shows it's capable of at least accessing an email address, some contact information, Chrome browser history, text messages and calls, and photos from the camera.

 

Snippets of this data are chosen at random to convince the victim that all their data has been copied -- although at this point the information hasn't actually been copied, but it could happen if the control server issues relevant instructions.

 

This basic form of ransomware demands the ransom via credit card, although researchers advise infected victims not to pay because there's is no guarantee that the information will be released or not used to blackmail victims again.

 

McAfee researchers have reported LeakerLocker to Google, which says it's "investigating" -- and it appears that the two apps including the malware have been removed from the Google Play store.

 

 

Source:

http://www.zdnet.com/article/this-android-ransomware-threatens-to-expose-your-browsing-history-to-all-your-contacts/#ftag=RSSbaffb68

76c90dd0e79a714317a8daeecc1584d2.png

  • FPCH Staff
Posted
Two applications in the Google Play Store contained the malware, Wallpapers Blur HD,..., and Booster & Cleaner Pro,
Google Play Store needs better screening.

 

Both apps have good review scores, suggesting that those behind the scheme have been giving them fake reviews.
Don't trust the reviews.
Posted

I was asked to update the calculator (I don't remember if it was on the phone or tablet).

I look over the permissions. It wanted access to my photos.

 

I see no reason why a calculator app wants to know what pictures I take! Needless to say, I did not update the calculator.

 

If people would read permissions and see something they question, stop and don't install the app!

 

In fact, I install very few apps.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...