skip to Main Content
bitcoin
Bitcoin (BTC) $ 96,384.82 1.19%
ethereum
Ethereum (ETH) $ 3,396.47 1.58%
tether
Tether (USDT) $ 0.999107 0.05%
xrp
XRP (XRP) $ 2.19 1.39%
bnb
BNB (BNB) $ 703.93 2.22%
solana
Solana (SOL) $ 190.12 0.86%
dogecoin
Dogecoin (DOGE) $ 0.318087 1.06%
usd-coin
USDC (USDC) $ 1.00 0.11%
staked-ether
Lido Staked Ether (STETH) $ 3,392.65 1.34%
cardano
Cardano (ADA) $ 0.896785 3.64%

Mobile Ransomware That Doesn’t Ask Victims For Crypto Emerges

Research from a cybersecurity firm unveiled a type of ransomware that impersonates the FBI.

2733 Total views

44 Total shares

Mobile Ransomware That Doesn't Ask Victims For Crypto Emerges

A report from cybersecurity firm Check Point unveiled a new ransomware attack, where cybercriminals pose as the FBI to demand victims pay their “fine” by credit card. 

According to the April 28 report, the malware — known as “Black Rose Lucy” — is unusual, since there are no ransom payments involving cryptocurrencies like Bitcoins (BTC) and it affects users of mobile devices with Android as an operating system.

Check Point had already tracked the beginnings of the malware since September 2018, originating in Russia as a “Malware-as-a-Service” (MaaS) botnet. However, it took the form of ransomware to make various changes to the device and install malicious applications.

Fake FBI warnings

As usual with ransomware attacks, Lucy encrypts files on the infected device and displays a fake FBI warning, accusing the victim of possessing pornographic content on their devices.

The message also states that the details of the targeted user have been uploaded to the FBI Cyber Crime Department’s Data Center and lists a series of bogus charges brought against them.

The fine is $500, but it must be paid via credit card instead of Bitcoin, as ransomware attacks usually operate.

Not a serious threat

Speaking with Cointelegraph, Brett Callow, threat analyst at Emsisoft, said he doesn’t believe that mobile platforms are a target for serious ransomware groups: 

“It’s simply not where the money is at. While an attack on corporate endpoints and servers can bring a company to a standstill and enable the criminals to extort a significant ransom, the same cannot be said for an attack on mobile devices.”

Callow adds the following comment on the fact that ransomware attacks, like Lucy, accept credit card payment:

“The fact that these low-level sextortion scammers are seemingly transacting via credit card rather than Bitcoin is unusual but not a particularly significant development. I certainly wouldn’t expect to see any of the real ransomware groups adopting the strategy.”

Android’s users get hacked with fake notifications

The cybersecurity firm says that Lucy uses an “ingenious” method to circumvent Android security, displaying a message asking the user to activate real-time video optimization.

As a next step, the cybercriminals persuade the victim to give malware permission to use the accessibility function in Android.

Cointelegraph reported on April 21 about a publication from Emsisoft lab malware that highlighted that there was a significant drop in the number of successful ransomware attacks on the public sector during Q1 2020, despite the COVID-19 crisis.

Loading data ...
Comparison
View chart compare
View table compare
Back To Top