Black Rose Lucy Ransomware attack on Android Devices

2148

Security Researchers from Check Point Research have discovered that those spreading Black Rose Lucy Malware has added file-encrypting capabilities to their malicious software which was originally designed as a botnet to deliver malware-as-a-service and dropper for other malicious codes.

Ā 

As per the details available to select media channels, Black Rose Lucy Malware turned ransomware encrypts files and data on an Android device and then sends a message to the victim via a web browser mimicking the FBI.

Ā 

The pop message states that the victim has visited a Forbidden X rated website which was banned by law enforcement and threatens to leak info to the FBI if the victim fails to pay a ransom.

Ā 

Check Point claims that the victim is only left with an option of paying $500 penalty within 3 days or might face serious consequences. Another highlight in this ransomware saga is that the victim needs to pay the hackers through credit cards and not Cryptocurrencies such as Bitcoins and Monero.

Ā 

Researchers say that hackers are turning to tactics like spreading mobile ransomware as such devices usually tend to have fewer security features.

Ā 

Note-Ā Black Rose Lucy is reported to have originated in Russia in 2018 and was initially spread through social media links and messaging apps.

Ā 

How to keep your Android Phones secured from ransomware attacks

Ā 

1.) The best way to prevent ransomware attacks on your mobile phone is to keep your phone loaded with antivirus software

Ā 

2.) Think twice before clicking on email & message links as they might turn into phishing scams distributing malware.

Ā 

3.) Never download apps from unknown sources like websites and prefer downloading from only the Apple App Store or Google play store.

Ā 

4.) Better to back your file to a cloud storage platform

Ā 

5.) Always keep your operating system with the latest updates

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display