When ESET researchers analyzed the first
file-encrypting Trojan to demand a ransom from Android users via a
control centre hidden on the anonymized Tor Network, the malware was
“somewhat anticipated”,
ESET malware researcher Robert Lipovsky writes.
The malware
Android/Simplocker, available as a bogus app, seems at present to be a proof-of-concept rather than a fully-fledged attack ready for mass release.
Only last month,
Lipovsky reported on an Android worm, Samsapo.A.
which displayed as an SMS message with text reading “Это твои фото?”
(which is Russian for “Is this your photo?”) and a link to the malicious
APK package.
In
ESET’s Threat Trends Report predictions for this year, ESET experts warned of “an escalating increase in serious threats targeting
Android phones
and tablets – ESET detections of such malware increased more than 60%
between 2012 and 2013. This trend is predicted to continue in 2014.”
ESET Latin America’s Research Laboratory in Buenos Aires points out
that malware afflicting Android now uses classic PC attack methods – the
discovery of vulnerabilities, then their exploitation through malicious
code.
Thankfully, most of these threats can be avoided by sensible use of your device.
Robert Lipovsky writes,
“We encourage users to protect themselves against these threats using
prevention and defensive measures. Adhering to security best practices,
such as keeping away from untrustworthy apps and app sources, will
reduce your risks. And if you keep current backups of all your devices
then any ransomware or Filecoder trojan – be it on Android, Windows, or
any operating system – is nothing more than a nuisance.”
Install ALL apps from Google Play or other big-name app stores unless you have a good reason not to
There are good reasons to install apps from outside Google’s Play
Store (or other big-brand stores such as Amazon’s) – for instance, if
your employer requires you to install a messaging app for work.
Otherwise, don’t. Third-party stores, particularly those offering
big-name apps for free are generally infested with malware, and
downloading apps from them is a good way to get infected. If you HAVE to
install a file from an unknown source, ensure your device is set to
automatically block such installations afterwards.
Don’t assume you’re safer on your Android
“Stay alert and don’t fall for common social engineering tricks,”
says Lipovsky.
Links, downloads and attachments can be just as risky on Android as
they can on PC. It’s easy to assume that, for instance, opening emails
on Android isn’t as risky as it can be on PC – but while Android malware
is still rarer than the PC variety, phishers, for instance, may direct
you to a fake website to harvest private information just as easily on
an Android phone.
If posssible, don’t use any old ‘Droid
In an ideal world, you should use a new phone, running the latest
version of Android – KitKat. Older versions are less secure – and your
operator may not issue an upgrade for your handset, even if Google does.
ESET Senior Research Fellow Righard J. Zwienenberg wrote last year, in
response to a vulnerability “The biggest problem for consumers is the
enormous number of old phones running Android that are still in use, for
which the operators will not release a new version. Many phones still
run the very popular, but outdated, Gingerbread Android platform.
Regardless of whether Google releases patches for these versions, the
phones will remain vulnerable.”
Ensure you are running the latest update of Android available for your device
Updates from Google should be available OTA (over the air) – and on
newer phones, you should be able to set your phone to auto-update (with a
restriction to do so via Wi-Fi rather than cellular networks). The area
under Settings where you can alter these settings varies by
manufacturer (on Samsung’s S5, it’s under About Device), but the menu
option you need is Software Update. Select the first menu option to
check you are running the latest version, and if not download and update
it immediately.
Do the basics – lock your phone
If you own the very latest handsets such as Samsung or HTC’s
flagships, you might have the luxury of locking your phone with up to
three fingerprints using a built-in scanner- but if not, there’s no
excuse for not locking it with either a PIN, or, ideally a password.
Settings > Security > Screen Lock. On new devices, you’ll usually
get a choice of pattern, PIN, or password. A pattern’s less secure than
a PIN, and a password is your best choice. If you’re using your tablet
or smartphone for business, be extra careful. Talk to your IT
department, and read our guide to
encrypting data on Android here.
Don’t keep your valuables on your device
Lipovsky says,
“If you keep current backups of all your devices then any ransomware or
Filecoder trojan – be it on Android, Windows, or any operating system –
is nothing more than a nuisance. “Backup your phone when possible –
either manually, by connecting to a PC, or by using your manufacturer’s
auto-backup (Samsung accounts, for instance, will allow you to back up
phones). Use apps such as Google Drive or Dropbox to ensure data – like
photographs – is not solely stored on the device.
Lock off apps which might give away information
Apps such as Dropbox can contain information that is very useful to
cybercriminals – a passport scan or a photograph of a credit card, for
instance. There are various options for hiding and locking apps – the
free App Locker remains highly popular, despite its slightly annoying
adware which inserts pop-up ads throughout the OS. Download from Google
Play, and lock off sensitive apps – messaging, email, social networking,
file storage, banking – behind a PIN or password.
Inspect every app’s permissions before
When installing an Android app, you will see a list of “Permissions” –
functions the app is allowed to access. Permissions such as “Full
network access” or the ability to send and receive SMSs should make you
think hard about installing the app. It’s not a guarantee the app is
malicious – Facebook’s list of Permissions is long and alarming – but
particularly when attached to a screensaver, clock, or other app which
has no logical reason to need communications abilities, this should be
taken as a warning that you might be dealing with malware.
Use a mobile security app
Android malware used to be dismissed as a myth – or largely an
annoyance designed to run up bills via premium SMS messages. The
discovery of PC-like malware such as
Android/Simplocker shows
just how fast malware is evolving for Google’s devices – and how like
its PC cousins it’s becoming. Google’s own policing of its Play Store
has improved hugely, but for peace of mind, a regular malware scan of
your device is recommended. ESET’s Lipovsky says, “A mobile security app
such as
ESET Mobile Security for Android will keep malware off your device.” Set the app to scan your phone regularly and automatically.
Use Google’s own defenses to the full
Google offers a pretty decent selection of security features built in
– including a location tracker, which can help find a lost device.
Visit
Google’s Android Device Manager page
to activate it while logged into your Google account and you’ll be able
to force a device on silent mode to ring, remote-lock a device, and
view its location on a map. If you own several Androids, you’ll be able
to see them all. More advanced protection is offered by AV programs such
as
ESET’s Mobile Security and Antivirus, but Google’s own, rolled out quietly to any users of Android 2.2 and above last autumn, is a good first step.
Never pay a ransomware author
While the implementation of the encryption in
Android/Simplocker
is clumsy compared to notorious PC malware such as Cryptolocker, it can
still effectively destroy files. Lipovsky advises that the one thing
users must not do is pay up, “The malware is fully capable of encrypting
the user’s files, which may be lost if the encryption key is not
retrieved. While the malware does contain functionality to decrypt the
files, we strongly recommend against paying up – not only because that
will only motivate other malware authors to continue these kinds of
filthy operations, but also because there is no guarantee that the crook
will keep their part of the deal and actually decrypt them.”
No comments:
Post a Comment