Android ransomware downloads malicious apps that lock your device
Security firm discovers app-downloading exploit kit


A new breed of Android malware that automatically downloads malicious apps was uncovered by security researchers after it attacked one of their company's test devices.
The exploit kit, which is the first stage of the attack, is delivered via a malicious ad on a website (also known as malvertising) that contains hostile Javascript, according to security firm Blue Coat.
The kit then installs ransomware masquerading as an app onto the Android device.
This ransomware executes automatically at a time of the malware author's choosing. When executed, it poses as a message from fake law enforcement agency Cyber.Police, with the seals of the FBI and NSA also displayed to give it an additional level of credibility.
This veneer of credibility is almost immediately undermined, however, as it demands payment in iTunes gift cards.
The malware itself is in fact quite crude - rather than encrypting the whole device and all the files contained on it, as most modern ransomware does, it instead simply locks it.
While quite old fashioned in this respect, Blue Coat researcher Andrew Brandt said this was the first time "an exploit kit has been able to successfully install malicious apps on a mobile device without any user interaction on the part of the victim".
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"During the attack, the device did not display the normal 'application permissions' dialog box that typically precedes installation of an Android application," he said in a blog post.
In consultation with another researcher, Joshua Drake of Zimperium, it was determined that the malicious Javascript used at the beginning of the attack "contains an exploit against libxslt that was leaked during the Hacking Team breach".
"The commoditised implementation of the Hacking Team ... exploits to install malware onto Android mobile devices using an automated exploit kit has some serious consequences," said Brandt.
"The most important of these is that older devices, which have not been updated (nor are likely to be updated) with the latest version of Android, may remain susceptible to this type of attack in perpetuity. That includes so-called media player devices - basically inexpensive, Android-driven video playback devices meant to be connected to TVs - many of which run the 4.x branch of the Android OS," he added.
While there is little a user can do to protect against the attack if they are unable to upgrade from a vulnerable operating system, they can take mitigating steps by regularly backing up their device.
That way, if they are attacked by this malware or others, they can reset the device to factory default and restore from backup without losing very much or any data.

Jane McCallion is Managing Editor of ITPro and ChannelPro, specializing in data centers, enterprise IT infrastructure, and cybersecurity. Before becoming Managing Editor, she held the role of Deputy Editor and, prior to that, Features Editor, managing a pool of freelance and internal writers, while continuing to specialize in enterprise IT infrastructure, and business strategy.
Prior to joining ITPro, Jane was a freelance business journalist writing as both Jane McCallion and Jane Bordenave for titles such as European CEO, World Finance, and Business Excellence Magazine.
-
What is 'quiet cracking' and how can leaders stop it?
In-depth The latest workplace phenomenon is being fueled by fears of AI taking jobs and a lack of communication from leaders
-
Majority of English data centers use less water than a 'typical leisure center'
News England’s data centers are surprisingly efficient when it comes to water consumption
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos
-
Google cyber researchers were tracking the ShinyHunters group’s Salesforce attacks – then realized they’d also fallen victim
News In an update to an investigation on the ShinyHunters group, Google revealed it had also been affected
-
Nearly one-third of ransomware victims are hit multiple times, even after paying hackers
News Many ransomware victims are being hit more than once, largely thanks to fragmented security tactics
-
75% of UK business leaders are willing to risk criminal penalties to pay ransoms
News A ransom payment ban is a great idea - until you're the one being targeted...
-
The Scattered Spider ransomware group is infiltrating Slack and Microsoft Teams to target vulnerable employees
News The group is using new ransomware variants and new social engineering techniques - including sneaking into corporate teleconferences
-
Hackers breached a 158 year old company by guessing an employee password – experts say it’s a ‘pertinent reminder’ of the devastating impact of cyber crime
News A Panorama documentary exposed hackers' techniques and talked to the teams trying to tackle them
-
The ransomware boom shows no signs of letting up – and these groups are causing the most chaos
News Thousands of ransomware cases have already been posted on the dark web this year