{"id":85304,"date":"2017-12-12T20:42:04","date_gmt":"2017-12-12T15:12:04","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=85304"},"modified":"2017-12-13T10:08:48","modified_gmt":"2017-12-13T04:38:48","slug":"android-ransomware-demands-itunes-gift-card-ransom-analysis-quick-heal-security-labs","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/android-ransomware-demands-itunes-gift-card-ransom-analysis-quick-heal-security-labs\/","title":{"rendered":"Android ransomware demands iTunes gift cards as a ransom \u2013 an analysis by Quick Heal Security Labs"},"content":{"rendered":"<p>Typically, a ransomware will demand money or cryptocurrency after it has locked down your computer or phone or encrypted its data. But, Quick Heal Security Labs has spotted an Android ransomware that demands iTunes gift cards after it locks down the infected device. These gift cards can be sold on auction sites, social media or on the dark web.<\/p>\n<p><strong>Infection vector<\/strong><\/p>\n<p>Your Android device can get infected with this ransomware if you download a malicious app (that goes by the name \u2018Porn Hub\u2019) on third-party app stores or by receiving the app via electronic transfer mediums (Bluetooth, emails, file sharing sites, etc.)<\/p>\n<p><strong>Analysis of Porn Hub app ransomware<\/strong><\/p>\n<p><em>AppName: Porn Hub<br \/>\n<\/em><em>Package name: com.pornhub_tools<br \/>\n<\/em><em>MD5: 9fadc90562ce6e275eb6db8e6ca6ddad<br \/>\n<\/em><em>Size: 39KB<\/em><\/p>\n<p>After the ransomware locks down your device, it displays a ransom note where it demands a ransom of an iTunes gifts card worth $200 as a penalty for watching child pornography. An URL is displayed in the ransom note (fig 1). This happens if your device is connected to the Internet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85306 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/fig-1-234x390.png\" alt=\"\" width=\"234\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-1-234x390.png 234w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-1-180x300.png 180w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-1.png 768w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/><\/p>\n<figure id=\"attachment_85307\" aria-describedby=\"caption-attachment-85307\" style=\"width: 234px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85307\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/fig-1--234x390.png\" alt=\"\" width=\"234\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-1--234x390.png 234w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-1--180x300.png 180w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-1-.png 768w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/><figcaption id=\"caption-attachment-85307\" class=\"wp-caption-text\">Fig 1.<\/figcaption><\/figure>\n<p>If your device is not connected to the Internet, the ransom note displays a different message. In this one, it says that all your files have been encrypted and that you must pay a ransom of $100 worth Bitcoins in order to unlock the device and decrypt the data (fig 2).<\/p>\n<figure id=\"attachment_85308\" aria-describedby=\"caption-attachment-85308\" style=\"width: 234px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85308\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/fig-2-234x390.png\" alt=\"\" width=\"234\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-2-234x390.png 234w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-2-180x300.png 180w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-2.png 768w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/><figcaption id=\"caption-attachment-85308\" class=\"wp-caption-text\">Fig 2.<\/figcaption><\/figure>\n<p>In our analysis, however, we found no instances where the infected device\u2019s data is encrypted by this ransomware. Moreover, the malicious app (\u2018Porn Hub\u2019) does not have any encryption code. This means you can retrieve your personal information by connecting the device to your PC.<\/p>\n<p><strong>Technical<\/strong><strong> Analysis<\/strong><\/p>\n<p>When we tried opening the malicious app, it asked us to activate the Device Administrator rights. We selected \u2018cancel\u2019 but the app kept repeating the same activity until we selected the \u2018activate\u2019 option.<\/p>\n<p>Once activated, the app checked if the device is connected to the Internet. When the device was online, the app collected device data such as device ID and sim operator. This data was sent to a certain URL (https:\/\/*******.w*n\/\/private\/tuk_tuk.php) which loads the webpage demanding the iTunes gift card (fig 1).\u00a0 And when the device was offline, the app loaded an HTML page demanding Bitcoins (fig 2).<\/p>\n<figure id=\"attachment_85309\" aria-describedby=\"caption-attachment-85309\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85309\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/Code_snippet_for_connecting_URL_or_loading_HTML_page-650x77.png\" alt=\"\" width=\"650\" height=\"77\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_for_connecting_URL_or_loading_HTML_page-650x77.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_for_connecting_URL_or_loading_HTML_page-300x35.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_for_connecting_URL_or_loading_HTML_page-768x91.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_for_connecting_URL_or_loading_HTML_page-789x93.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_for_connecting_URL_or_loading_HTML_page.png 1069w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85309\" class=\"wp-caption-text\">Fig 3. Code snippet for connecting URL or loading HTML page<\/figcaption><\/figure>\n<p>Here, the URL and HTML page content is encrypted using Base64. The Base64 encoded strings are decoded as shown in fig 4.<\/p>\n<figure id=\"attachment_85310\" aria-describedby=\"caption-attachment-85310\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85310\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/HTML_code_shown_in_fig-2-650x308.png\" alt=\"\" width=\"650\" height=\"308\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/HTML_code_shown_in_fig-2-650x308.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/HTML_code_shown_in_fig-2-300x142.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/HTML_code_shown_in_fig-2-768x364.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/HTML_code_shown_in_fig-2-789x374.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/HTML_code_shown_in_fig-2.png 1224w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85310\" class=\"wp-caption-text\">Fig 4. This is the same HTML code shown in fig 2<\/figcaption><\/figure>\n<figure id=\"attachment_85311\" aria-describedby=\"caption-attachment-85311\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85311\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/Code_snippet_of_the_device\u2019s_data_collection_and_URL_generation-650x257.png\" alt=\"\" width=\"650\" height=\"257\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_of_the_device\u2019s_data_collection_and_URL_generation-650x257.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_of_the_device\u2019s_data_collection_and_URL_generation-300x118.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_of_the_device\u2019s_data_collection_and_URL_generation-768x303.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_of_the_device\u2019s_data_collection_and_URL_generation-789x311.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/Code_snippet_of_the_device\u2019s_data_collection_and_URL_generation.png 945w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85311\" class=\"wp-caption-text\">Fig 5. Code snippet of the device\u2019s data collection and URL generation<\/figcaption><\/figure>\n<p><strong>Analysis of fake Dropbox app ransomware<\/strong><\/p>\n<p><strong>\u00a0<\/strong><em>AppName: Dropbox<br \/>\n<\/em><em>Package name: com.example.testlock<br \/>\n<\/em><em>MD5: 17bc088027d2f3f71a74beed3a9c715<br \/>\n<\/em><em>Size: 415KB<\/em><\/p>\n<p><strong>\u00a0<\/strong>Quick Heal Security Labs found another malicious app hiding a ransomware which demands iTunes gift cards as a ransom. This app uses the icon of Dropbox (a famous a file hosting service). When we opened this app, it asked us to activate the Device Administrator rights (fig 6), just like the app we discussed earlier.<\/p>\n<figure id=\"attachment_85312\" aria-describedby=\"caption-attachment-85312\" style=\"width: 234px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85312\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/fig-5-234x390.png\" alt=\"\" width=\"234\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-5-234x390.png 234w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-5-180x300.png 180w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-5.png 768w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/><figcaption id=\"caption-attachment-85312\" class=\"wp-caption-text\">Fig 6.<\/figcaption><\/figure>\n<p>Once activated, the ransomware displays a ransom note claiming that the device has been locked by the Federal Bureau of Investigation (FBI) as a penalty for watching child pornography. To unlock the device, an iTunes gift card worth $25 has to be paid within 72 hours (fig 7).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85315 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/fig-6-234x390.png\" alt=\"\" width=\"234\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-6-234x390.png 234w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-6-180x300.png 180w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-6.png 768w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/><\/p>\n<figure id=\"attachment_85316\" aria-describedby=\"caption-attachment-85316\" style=\"width: 234px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85316\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/fig-6--234x390.png\" alt=\"\" width=\"234\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-6--234x390.png 234w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-6--180x300.png 180w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-6-.png 768w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/><figcaption id=\"caption-attachment-85316\" class=\"wp-caption-text\">Fig 7.<\/figcaption><\/figure>\n<p>The ransom note asks the user to enter an iTunes gift card code of the demanded value. If the user enters a wrong code, a message is displayed saying that the user is now left only with 2 attempts after which the device will be locked permanently (fig 8).<\/p>\n<p>In our analysis, however, we found that the warning is fake and only shown to threaten the user into paying up the ransom.<\/p>\n<figure id=\"attachment_85317\" aria-describedby=\"caption-attachment-85317\" style=\"width: 234px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85317\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/12\/fig-7-234x390.png\" alt=\"\" width=\"234\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-7-234x390.png 234w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-7-180x300.png 180w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/12\/fig-7.png 768w\" sizes=\"(max-width: 234px) 100vw, 234px\" \/><figcaption id=\"caption-attachment-85317\" class=\"wp-caption-text\">Fig 8.<\/figcaption><\/figure>\n<p><strong>Quick Heal Detection<\/strong><\/p>\n<p>Quick Heal successfully detects both these ransomware as <strong>Android.Locker.Aa54f<\/strong> and <strong>Android.Locker.Aa550<\/strong>.<\/p>\n<p>It is strongly recommended not to pay any ransom because there is no guarantee that you will get your files back or have your device unlocked even after paying the ransom.<\/p>\n<p><strong>\u00a0<\/strong><strong>How to stay safe from Android ransomware <\/strong><\/p>\n<ol>\n<li>Before downloading any app (even from Google Play), verify its source. Check the developer\u2019s website and reviews on the app.<\/li>\n<li>Avoid downloading apps from third-party app stores. Most malware-infected apps are found on these stores. Download apps only from official app stores such as Google Play.<\/li>\n<li>Always keep \u2018Unknown Sources\u2019 disabled. Enabling this option allows installation of apps from unknown sources (third-party). On your device, go to <strong>Settings <\/strong>&gt; <strong>Security <\/strong>&gt; check for <strong>Unknown Sources &gt; <\/strong>Disable it<\/li>\n<li>Install a reliable <a href=\"https:\/\/bit.ly\/2isL3JA\">mobile security app<\/a> on your phone that can block fake, suspicious and harmful apps.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><strong>Subject Matter Expert<\/strong><br \/>\nRupali Parate | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Typically, a ransomware will demand money or cryptocurrency after it has locked down your computer or phone or encrypted its data. But, Quick Heal Security Labs has spotted an Android ransomware that demands iTunes gift cards after it locks down the infected device. These gift cards can be sold on auction sites, social media or [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":85318,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-85304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85304"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=85304"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85304\/revisions"}],"predecessor-version":[{"id":85322,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85304\/revisions\/85322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85318"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=85304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=85304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=85304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}