June 29, 2017 By Douglas Bonderud 2 min read

Mobile ransomware is a huge headache. Beyond the inconvenience of locking down files and demanding cash for their release, Threatpost pointed out that most pieces of malicious code don’t leverage vulnerabilities to exploit devices but rely on users to download programs, which in turn give cybercriminals total system access.

Recently, Kaspersky Lab reported that a rise in Android malware increased 2017 first-quarter attacks threefold compared to 2016 — thanks to Svpeng.

Svpeng Boosts Mobile Ransomware Infections

According to Kaspersky Lab, from the beginning of 2015 through the end of 2016, mobile ransomware attacks fell almost 5 percent. But a sudden spike in December 2016 of the Svpeng malware family pushed early 2017 numbers up and over previous totals.

Until recently, two families of malware, Svpeng and Fusob, shared the mobile space more or less equally. Fusob tricks users into downloading a fake adult content player that then locks devices and demands a $100 to $200 ransom.

Svpeng, meanwhile, got its start in 2013 as a banking Trojan but has been modified to include ransomware functionality. Using a variety of techniques — from SMS messaging to fake video players to supposed updates for Adobe Flash players — Svpeng finds its way onto user devices, locks all files and may display a false FBI warning for downloading illegal content. Getting files back requires a payout of $100 to $500 with no guarantee of success.

PYMNTS.com said cybercriminals are shifting their focus to U.S. markets, while Canada, Germany and the U.K. remain popular targets. All of these countries enjoy widespread adoption of mobile and e-payment systems, making it more likely for malicious actors to succeed in extorting a cryptocurrency ransom.

A Growing Market

So why the sudden uptick in mobile ransomware? At first glance mobile devices seem like less-than-ideal candidates, since they’re often equipped with decent security measures and don’t offer attackers much in the way of easily exploitable vulnerabilities. However, the ubiquity of mobile devices and the way users interact with their devices makes them the perfect avenue for infection.

If device owners want something to improve their mobile experience, they want it immediately. That means they are likely to grant broad permissions if malicious software appears at the just the right moment, promising easy access to content or a quick fix for device issues.

While mobile malware is growing in sophistication, it’s also becoming more commercially available, allowing users with minimal skill to deploy ransomware across multiple platforms. The result? A booming economy for infections such as Svpeng and Fusob, and frustration for mobile users who weren’t expecting a sudden lockdown of personal files and demands for bitcoin payment.

While it’s easy to get stung by Svpeng or other strains of mobile ransomware, handing over the digital cash isn’t a good idea, iTWire explained. Just because fraudsters get paid doesn’t mean they’ll honor their end of the agreement and return devices to their original condition. And if victims pay up once, chances are they’ll do so multiple times. Put simply, spending to spring a smartphone from Svpeng only ramps up security risk.

Mobile ransomware is on the rise thanks to strong performance by Fusob and diversification in the Svpeng family. Staying safe means avoiding obvious traps — video players and Flash updates top this list — and passing on payment, even when pressured.

More from

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today