Zephyrnet Logo

Password found to rescue victims of malicious COVID-19 tracker app

Date:

Members of the cybersecurity and IT community have successfully obtained a password key for victims of the malicious CovidLock Android app, which supposedly helps track cases of the coronavirus, but actually locks users’ phones and demands a ransom in order to restore access.

The unlock token has been verified as 4865083501.

The recently discovered ransomware performs a screen-lock attack by forcing a change in the password required to unlock a phone, according to DNS threat intelligence company DomainTools in a blog post authored last week by Tarik Saleh, senior security engineer and malware researcher. For Android Nougat devices and later versions, the attack only works if the user never bothers to set a password in the first place.

A Reddit user, luca020400, responding to SC Media’s previous coverage of the app opened a thread revealing that they downloaded the APK was able to decompile it, without even installing it, in order to find the password needed to unlock the affected phones. The user also offered a proof via Imgur. Saleh confirmed that the password was correct. DomainTools is expected to publish its own technical post revealing the key sometime today.

Victims of the app are given a 48-hour deadline to pay a $100 ransom in bitcoin. To ratchet up the stakes, the ransomware program also threatens to erase one’s contacts, photos, videos and memory, as well as leak the victim’s social media accounts. “Note: Your GPS is watched and your location is known. If you try anything stupid your phone will be automatically erased,” the ransom note also states.

The malicious app, which purports to offer statistics on the COVID-19 pandemic and a heat map of outbreak hotspots, was found available for download at the domain coronavirusapp[.]site.

The researchers also is monitoring transactions associated with the attackers’ bitcoin wallet.

“Cybercriminals like to exploit people when they are at their most vulnerable. They use dramatic events that cause people to be emotional or fearful to drive their profits,” said Saleh. “The coronavirus is no different. Shortly after the first cases were confirmed, DomainTools’ researchers observed a minor uptick in domain names leveraging Coronavirus and COVID-19. These registrations have peaked significantly in the past few weeks and many of them are scams.”

Indeed, research firms across the cyber industry have been reporting surges in cyber scams leveraging fears surrounding coronavirus. In a similar scheme, researchers recently discovered a weaponized coronavirus map app that infects victims with a variant of the information-stealing AZORult malware.

SC Media recently interviewed Saleh at the 2020 RSA conference in San Francisco, as part of its annual “Trolley Talk” cable car interviews.

Source: https://www.scmagazine.com/home/security-news/password-found-to-rescue-victims-of-malicious-covid-19-tracker-app/

spot_img

Latest Intelligence

spot_img

Chat with us

Hi there! How can I help you?