ESET researchers discover first-ever ransomware misusing Android accessibility services

Detected by ESET products as Android/DoubleLocker, it is based on the foundations of a particular banking Trojan, renowned for misusing accessibility services of the Android operating system. However, DoubleLocker lacks the functions related to harvesting users’ banking credentials and wiping out their accounts. Instead, it has two other powerful tools for extorting money from its victims.

DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in it – a combination that has not been seen to date in the Android ecosystem.

“Given its banking malware roots, DoubleLocker may well be turned into what can be called ransom-bankers. Two-stage malware that first tries to wipe your bank or PayPal account and subsequently locks your device and data to request a ransom…

Speculation aside, we spotted a test version of such a ransom-banker in the wild as long ago as May, 2017,” comments Lukáš Štefanko, the ESET malware researcher who discovered DoubleLocker.

Distribution

DoubleLocker spreads in the very same way as its banking parent does. It is distributed mostly as a fake Adobe Flash Player through compromised websites.

Once launched, the app requests activation of the malware’s accessibility service, named “Google Play Service”. After the malware obtains the accessibility permissions, it uses them to activate device administrator rights and set itself as the default Home application, in both cases without the user’s consent.

“Setting itself as a default home app – a launcher – is a trick that improves the malware’s persistence. Whenever the user clicks on the Home button, the ransomware gets activated and the device gets locked again. Thanks to using the accessibility service, the user doesn’t know that they launched malware by hitting Home,” explains Lukáš Štefanko.

Locking both device and data

DoubleLocker, once executed on the device, creates two reasons for the victims to pay.

First, it changes the device’s PIN, effectively blocking the victim from using it. The new PIN is set to a random value which is neither stored on the device nor sent anywhere, so it’s impossible for the user or a security expert to recover it. After the ransom is paid, the attacker can remotely reset the PIN and unlock the device.

Second, DoubleLocker encrypts all files from the device’s primary storage directory. It utilises the AES encryption algorithm, appending the filename extension “.cryeye”.

The ransom has been set to 0.0130 BTC (approximately USD 54 at time of writing) and the message highlights that it must be paid within 24 hours. However, if the ransom is not paid, the data will remain encrypted and will not be deleted.

Figure 1: Encrypted files on a device infected with DoubleLocker

 

Figure 2: DoubleLocker ransom message

How to get rid of it?

In the ransom note, the user is warned against removing or otherwise blocking DoubleLocker: “Without [the software], you will never be able to get your original files back”. To prevent unwanted removal of the “software”, the crooks even recommend disabling the user’s antivirus software.

“Such advice is irrelevant: all those with a quality security solution installed on their devices are safe from DoubleLocker,” comments Lukáš Štefanko.

Lukáš Štefanko

For users who want to have their device cleaned of the DoubleLocker ransomware, Lukáš Štefanko recommends the following:

For devices that are not rooted and that don’t have a mobile device management solution installed capable of resetting the PIN, the only way to remove the PIN lock screen is via a factory reset.

If the device is rooted then the user can connect to the device by ADB and remove the file where the PIN is stored. For this to work, the device needs to have debugging enabled (Settings -> Developer options -> USB Debugging).

The PIN or password lock screen will be removed and the user can access the device. Then, working in safe mode, the user can deactivate device administrator rights for the malware and uninstall it. In some cases, a device reboot is needed.

“DoubleLocker serves as just another reason for mobile users to have a quality security solution installed, and to backup their data on a regular basis,” concludes Lukáš Štefanko.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Panasonic and Jasmy unveil Web3 Platform for IoT data control

Posted on: March 28, 2024

Panasonic has joined forces with Jasmy (JASMY) blockchain to introduce a Web3 platform that will facilitate the connection of personal data on the Internet of Things (IoT). The collaboration between the Japanese-based blockchain and Panasonic Advanced Technology was initiated in February, but the official announcement was made on March 26.

Read more

Driving connected personalised user experiences with Generative AI

Posted on: March 27, 2024

As the world continues to rapidly move towards digitalisation, customer expectations are also on the rise. Around the globe, telcos are grappling with meeting these expectations. As well as ensuring connectivity in a secure, seamless, and consistent manner 24/7, to compete and differentiate, operators now need to provide personalised experiences that are as unique as

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more