Charger Android Ransomware Reaches Google Play Store
Google has removed an app from the Play Store that contained a new Android ransomware family named Charger.
The app’s name is EnergyRescue, an app that posed as a battery-saving application, but which secretly stole a user’s SMS messages and contact list, uploaded the data to the crooks’ servers, and later locked the user’s device.
The ransom note, would go on to threaten users that if they didn’t pay, they’d publish his data online.
Some of these threats are empty since researchers didn’t observe the app ex-filtrating some of the information the crook’s threatened to expose, such as credit card details and bank accounts.
This type of ransomware that makes (empty) threats to expose a user’s private data has been recently referred to as “doxware.”
Security firm Check Point says it came across this threat after their mobile security app had quarantined the device of a client that installed the app.
After analyzing the ransomware, researchers found several things that stood out, compared to previous Android ransomware families.
The biggest of these was how the ransomware infected devices. Previous threats relied on droppers to gain a foothold on infected devices. These would be small apps, with limited malicious behavior, but which would bypass Google’s Play Store security checks, and later ask users for administrator rights.
If they’d convince users to grant them admin rights, these apps would download the real ransomware at later points.
Charger is quite sophisticated
With Charger this was different. Check Point says that the EnergyRescue app contained all the malicious code right from the get-go.
Despite putting all its code in one basket, researchers say that the Charger authors have done a good job at disguising the ransomware’s malicious behavior.
For starters, they encoded all strings as binary arrays, making it hard to inspect the app, even by veteran security researchers.
Second, they loaded malicious code from encrypted resources, where Google’s detection engine could not reach to inspect.
Third, they flooded the phone with useless commands, in order to hide malicious operations from a human’s manual inspection.
Last, Charger also included code that would check if the app ran inside Android emulators, and stop the ransomware from triggering. This is most likely the feature that allowed Charger to bypass Bouncer, the Play Store’s security scanner.
Charger avoided several former Soviet states
All of the above are advanced features, usually found in desktop ransomware. Additionally, just like a lot of desktop ransomware, Charger included checks that prevented the ransomware from executing if the phone’s owner was from countries such as Russia, Belarus, or the Ukraine.
“This is likely done to keep the developers from being prosecuted in their own countries or being extradited between countries,” said Oren Koriat and Andrey Polkovnichenko, the two Check Point researchers that analyzed this threat.