Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

Forget "Game of Thrones" as Android Ransomware Infects TVs

Accepted submission by Arthur T Knackerbracket at 2016-06-14 20:05:02
Security

Story automatically generated by StoryBot Version 0.1.0a (Development).

Note: This is the complete story and will need further editing. It may also be covered by Copyright and thus should be acknowledged and quoted rather than printed in its entirety.

FeedSource: [TheRegister] collected from rss-bot logs

Time: 2016-06-14 07:44:02 UTC

Original URL: http://www.theregister.co.uk/2016/06/13/android_ransomware_infects_tvs/ [theregister.co.uk]

Title: Forget �2Game of Thrones� as Android ransomware infects TVs

Suggested Topics by Probability (Experimental) : 20.0 science 16.4 business 14.5 hardware 9.1 digiliberty 9.1 OS 7.3 mobile 5.5 security 3.6 techonomics 3.6 code 3.6 breaking 1.8 technomics 1.8 gaming 1.8 careersedu 1.8 careers

--- --- --- --- --- --- --- Entire Story Below --- --- --- --- --- --- ---

Forget �2Game of Thrones� as Android ransomware infects TVs

Arthur T Knackerbracket has found the following story [theregister.co.uk]:

Researchers at Trend Micro have spotted a new variant of ransomware code that can be used to lock down Android-powered smartphones and televisions.

The FLocker (short for the Frantic Locker) malware has been in circulation since at least April 2015 and has concentrated on locking down smartphone handsets running the latest builds of Android. But the writer keeps on adding new features and has now extended the code to give smart TV owners problems too.

Not everyone is vulnerable, however. After the malware file is downloaded via an infected website or SMS file, it waits for 30 minutes before scanning its surrounding. If it determines the device is in Kazakhstan, Azerbaijan, Bulgaria, Georgia, Hungary, Ukraine, Russia, Armenia or Belarus, then it shuts down.

If the user isn't in one of those countries, the code will try and install a command and control system on the smartphone or TV. This requires the user to give the app admin permissions, but if that isn't forthcoming the malware will freeze the screen and then ask again under the guise of an operating system update to fix the "problem."

Once installed, it will flash up a message on an infected phone or TV claiming to be a law enforcement organization and demanding a $200 fine to be paid in iTunes gift cards – which is never the preferred method of payment to a government body – in exchange for the code to unlock the device.

"If an Android TV gets infected, we suggest user to contact the device vendor for a solution at first. Another way of removing the malware is possible if the user can enable ADB debugging," the advisory [trendmicro.com] reads.

"Users can connect their device with a PC and launch the ADB shell and execute the command 'PM clear %pkg%.' This kills the ransomware process and unlocks the screen. Users can then deactivate the device admin privilege granted to the application and uninstall the app."

This kind of cross-platform vulnerability is going to get a lot worse as more and more devices share operating system features with their computing and smartphone cousins. You can expect this to become a much bigger problem. ®


Original Submission