The ransomware masked itself as a beta version of Cyberpunk 2077 for Android

The ransomware masked as Cyberpunk 2077
Written by Emma Davis

Kaspersky Lab specialists discovered a ransomware that is masked as a beta version of Cyberpunk 2077 for Android and was distributed via cyberpunk2077mobile[.]com.

The site of the “mobile version” looked suspiciously like Google Play, and its creators claimed that the beta was released on the day the game was officially released. Allegedly, the “beta” has already been downloaded by about a thousand people, and some of them even left feedback, noting that the game is not bad for the beta version.

Although the website states that the application weighs 3.4 GB, when downloading the file, the file does not even reach 3 MB.

The ransomware masked as Cyberpunk 2077
When starting the application, first of all, it requires access to files on the device. In theory, the application may need these rights if the user wants to save or open something through it, but the game hardly needs photos and videos to start.

However, the application cannot run without this permission. Nevertheless, even if you give out all the rights to the fake version, you won’t be able to play either: instead of Cyberpunk 2077, the victim will only see a message demanding a ransom.

In a note in broken English, the user is warned that now all his photos and other important files are encrypted.

To recover them, you need to transfer $ 500 in bitcoins to the cybercriminals’ wallet. Otherwise, the malware will permanently delete the data and it will be impossible to recover it.says the message of the ransomware.

It is also impossible to get rid of the ransomware, according to the ransomware note: the files allegedly cannot be returned.

The researchers checked what actually happens to the files on the infected device. The threats were not empty: the files were indeed encrypted and assigned the .coderCrypt extension. In addition, the malware placed a README.txt file in each folder with the same note as in the application window.

However, it turned out to be possible to recover files without the help of malefactors. The fact is that the malware uses the RC4 symmetric encryption algorithm. That is, to decrypt the data, you need the same key with which they were encrypted.said Kaspersky Lab representatives.

In this case, the key was hardcoded into the application code. In all the samples that the experts came across, the key was: “21983453453435435738912738921“.

Experts also write that the authors of the fake beta Cyberpunk 2077 for Android are also distributing an encryptor for Windows, masked with the the same game.

The files encrypted by it can no longer be restored on their own, because the key is not hardcoded into the application code, but is randomly generated for each individual infection case. Perhaps this is precisely why they demand twice as much money from PC users as from victims of mobile malware.

Let me remind you that Hackers use PipeMon backdoor to attack game developers.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Emma Davis

I'm writer and content manager (a short time ago completed a bachelor degree in Marketing from the Gustavus Adolphus College). For now, I have a deep drive to study cyber security.

Leave a Reply

Sending

This site uses Akismet to reduce spam. Learn how your comment data is processed.