Security Market Segment LS
Wednesday, 25 January 2017 10:51

Charger malware beats Google Play integrity

By

Check Point Threat Prevention has detected new zero-day mobile ransomware dubbed Charger, which is included in the now removed Energy Rescue app on Google Play.

The infected app steals contacts and SMS messages from a device and asks for admin permissions. If granted, the ransomware locks the device and displays a message demanding payment:

You need to pay for us, otherwise we will sell portion of your personal information on black market every 30 minutes. WE GIVE 100% GUARANTEE THAT ALL FILES WILL RESTORE AFTER WE RECEIVE PAYMENT. WE WILL UNLOCK THE MOBILE DEVICE AND DELETE ALL YOUR DATA FROM OUR SERVER! TURNING OFF YOUR PHONE IS MEANINGLESS, ALL YOUR DATA IS ALREADY STORED ON OUR SERVERS! WE STILL CAN SELLING IT FOR SPAM, FAKE, BANK CRIME etc… We collect and download all of your personal data. All information about your social networks, Bank accounts, Credit Cards. We collect all data about your friends and family.

The ransom requested is .2 bitcoins which at today’s rate is $235.57, a little steep in comparison to amounts requested for desktops.

Most malware that makes it to Google Play contains only a dropper that later downloads the real malicious components to the device. Charger uses a heavy packing approach which makes it harder for the malware to stay hidden, so it must compensate – Charger’s developers gave it everything to boost its evasion capabilities so it could stay hidden on Google Play for as long as possible.

The malware uses several advanced techniques to hide its real intentions and makes it harder to detect.

  • It encodes strings into binary arrays, making it hard to inspect them.
  • It loads code from encrypted resources dynamically, which most detection engines cannot penetrate and inspect. The dynamically-loaded code is also flooded with meaningless commands that mask the actual commands passing through.
  • It checks whether it is being run in an emulator before it starts its malicious activity. PC malware first introduced this technique which is becoming a trend in mobile malware having been adopted by several malware families including Dendroid
  • It does not run its malicious logic if the device is located in Ukraine, Russia, or Belarus

Most paid anti-virus/malware will soon detect Charger. Check Point's report is here.

CHIEF DATA & ANALYTICS OFFICER BRISBANE 2020

26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more

DOWNLOAD NOW!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments