Short Bytes: According to a report, a Chinese Android ransomware creation kit is being spread on hacking forums and Chinese social networking websites. The app doesn’t need any coding skills to generate a ransomware variant on the device itself. The hacker simply needs to make a one-time payment to be able to create unlimited variants. The readers are advised to follow the basic security practices to ensure their safety.
Gone are the days when ill-famed hackers had to write their own scripts and run exploits to gain access to the computers. Today, there are tons of free and premium Trojan Development Kits (TDKs) that could be used to create malware without any prior knowledge of programming or subtleties of hacking.
Recently, Symantec’s Dinesh Venkateshan spotted a specially crafted Android-based application that can be used to develop a functional Android ransomware. The whole process of creating the ransomware is automated with the help of a DAME (Device-Aided Malware Engineering) tool model.
This Android ransomware creation app is available on different hacking forums and Chinese social networking messaging service. The app is reported to be featuring an easy-to-use interface. Different functions available in the app are:
- Icon to be used for malware
- Key to be used to unlock the device
- Message to be displayed on the locked screen of infected device
- Custom operations to randomize the code
- Animation to be shown on infected device
According to the report, the ransomware created using this process mimics the Lockdroid behavior of locking the screen. The entire process is done on the smartphone without any need to write a single piece of code.
Symantec has also listed some security measures that one can take to defeat the ransomware attacks. These measures include — regular software updates, downloading apps only from Play Store, creating a backup of data, taking a look at the requested permissions, and installing a security app.
Did you find this article on Android ransomware interesting? Don’t forget to share your views with us.