Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Kaspersky Analyzes Distribution Network for Koler Mobile Ransomware

Kaspersky Lab has published a new research paper on Koler, the “police” ransomware that has been targeting Android users since April.

Kaspersky Lab has published a new research paper on Koler, the “police” ransomware that has been targeting Android users since April.

According to the report released Monday by the security firm, the mobile component of the campaign has not been functional since July 23, with the command and control (C&C) servers sending “uninstall” commands to infected devices in order to remove the malicious applications. However, Kaspersky is still working with international law enforcement agencies in an effort to completely shut down the campaign, which now targets PC users as well.

The existence of Koler was brought to light in early May by the French security researcher known as Kafeine. The threat is designed to lock the screen of infected Android devices and instruct their owners to pay between $100 and $300 to have them unlocked. The bogus warning messages are made to look like they come from law enforcement agencies from a total of 30 countries.

The mobile ransomware itself is simple. It doesn’t encrypt files, users must manually download and install the malicious application, and the screen locking mechanism works by putting the ransom note on top of other windows and not allowing interaction with it. However, according to Kaspersky, this campaign is highly notable because of the sophisticated distribution network used by cybercriminals.

The distribution infrastructure relies on a network of at least 48 malicious adult websites linked to the Keitaro traffic redirection system that takes victims to various payloads depending on their location and the type of device they’re using – PC or mobile. Researchers believe the cybercrooks are using pornographic websites in their scheme because people visiting such sites are more likely to think that they really have accessed illegal content, as the ransomware messages say.

When Internet users visit one of these websites from a mobile device, they’re redirected to a page that’s set up to serve the malicious Android application. If the victims are from one of the 30 countries targeted by Koler, but not using an Android device or Internet Explorer, they’re redirected to a browser-based lock screen that’s similar to the one served to Android users. There’s no malware infection, just a pop-up window that can be easily closed by pressing the ALT+F4 key combination, Kaspersky said.

The last scenario is the one in which victims visit one of the malicious adult websites from a PC using Internet Explorer. In this case, they are redirected to a website that hosts the Angler exploit kit, which leverages Java, Adobe Flash and Silverlight vulnerabilities to deliver a payload. Researchers say the exploit code is fully functional, but no payload is served for the time being.

Data from the C&C servers shows that over 146,000 of the visitors of these malicious websites are located in the United States, with the largest number of victims recorded in April, when the campaign started. As for the adult websites involved in the distribution network, Kaspersky has determined that they’re not compromised sites, but ones that have been created specifically for such purposes.

Advertisement. Scroll to continue reading.

“Of most interest is the distribution network used in the campaign. Dozens of automatically generated websites redirect traffic to a central hub using a traffic distribution system where users are redirected again,” commented Vicente Diaz, principal security researcher at Kaspersky Lab. “We believe this infrastructure demonstrates just how well organized and dangerous this campaign is. The attackers can quickly create similar infrastructure thanks to full automation, changing the payload or targeting different users. The attackers have also thought up a number of ways of monetizing their campaign income in a truly multi-device scheme.”

The complete paper, “Koler – The ‘Police’ ransomware for Android,” is available online in PDF format.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.