Skip to main content

New Android ransomware is spreading through text messages

 

There’s a new type of Android ransomware making the rounds that leverages SMS text messages to spread, according to a new report from cybersecurity company ESET. The ransomware has been active since July 12, and essentially uses victims’ contacts lists to spread.

Recommended Videos

According to the ESET blog post, the malware is called Android/Filecoder.C, and was first distributed on Android developer forums on Reddit, including the XDA Developers subreddit. On these forums, the malware was distributed through pornographic posts.

Usually, the ransomware is disguised as an online sex simulator game, but sometimes its also a tech-related app. Once downloaded, the infected .APK file initiates contact with a server to access a list of addresses and encrypt and decrypt files in the background. It then sends the text messages, and scans the device to encrypt files with the extension “.seven.” That prevents users from being able to access files on their own device. Users are then told that to decrypt their files, they have to pay a ransom — which is usually between $94 and $188 — in the form of Bitcoin. According to the report, the ransom message could be shown in one of 42 languages, maximizing its reach. The malware is able to choose the language of the system, so the user can understand it. Once the ransom is paid, a the private key is sent to the victim, and they can then decrypt the files.

Once the malware is on a device, it’s able to send text messages to contacts on the phone with a link to an app that apparently uses the recipients’ photos — when, of course, it’s actually a malicious app. Sometimes, the link is masked using a bit.ly link.

It’s important to note that if you do find yourself with the malware, your files may not be lost, and you may not have to pay the ransom. According to ESET, while the ransom message says that files will be deleted in 72 hours, that isn’t always the case. Not only that, but encrypted files can be recovered without paying the attackers — though ESET is quick to note that if the attackers fix the flaws, the malware could become more advanced and become a more serious threat.

So how can you prevent being attacked? Simple — don’t download any apps from third-party sources, and don’t click on links sent via text message that tell you your photos are being used in an app.

Christian de Looper
Christian de Looper is a long-time freelance writer who has covered every facet of the consumer tech and electric vehicle…
Google boosts Android security against unknown tracking devices
Unknown tracker alert for Android.

Google is adding a couple of new features to Android’s safety alert system that will help users find unknown trackers moving with them. The new features cover all tags and tracking devices that support Google’s Find My Device service for locating lost hardware.

The first one is Find Nearby. This one will help users locate any hidden tracker. For example, if your Android phone flashes an unknown tracker alert, you can check for its presence using the Play Sound feature.

Read more
Here’s how your Android phone could help stop your motion sickness
Someone holding the Google Pixel 9 with the screen on.

Motion sickness — also called kinetosis — is a common problem. In fact, as many as one in three people have felt sick while in a vehicle. For those who suffer from it, reading in the car is practically impossible.

Apple introduced a feature that helps those prone to motion sickness use their phones without the accompanying nausea. Now, Google is working on a similar feature for Android phones.

Read more
WhatsApp will soon save you from the horrors of missed texts
Reminders feature in WhatsApp.

Just over a month ago, WhatsApp introduced a new feature that would occasionally nudge users about status story updates from their contacts list. Now, the company has made a subtle change to it and added messages into the fold, as well.

The feature, which is currently rolling out in the test channel with the v2.24.25.29 build on Android, was first spotted by update tracker WABetaInfo. DigitalTrends can confirm that the feature is now live in the latest beta version available via the Google Play Store.

Read more