Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
One of thefirst times the public witnessedfirsthandand realized the power of ransomware was when WannaCry broke out in 2017. The government, education, hospitals, energy, communications, manufacturing and many other key information infrastructure sectors suffered unprecedented losses.Looking back, thatwas just the beginning, as there have since been many versions, such asSimpleLocker, SamSam and WannaDecryptor for example.
Comodo’s Threat Research Labs has received news that the ‘Black Rose Lucy’ ransomware has new variants that are attacking AndroidOS.
Black Rose Lucy malware did not have ransomware capabilities at the time of its discovery by Check Point back inSeptember2018.At that time,Lucy was a Malware-as-a-Service(Maas) botnet and dropper for Android devices. Now, it’s back with new ransomware capabilities that allow it take control of infected devices to modify and install new malware applications.
When downloaded, Lucy encrypts the infected device and a ransom message pops up in the browser, claiming it is a message from the US Federal Bureau of Investigation (FBI) due to pornographic content found on the device.The victim is instructedto pay a $500 fine by entering credit card information, instead of the more common Bitcoin method.
Figure 1. Lucy ransomware used resource images.
Comodo Threat Research Center collected samples and conducted an analysis when we realized that Black Rose Lucy was back.
Disguised as a normal video player application, via media share links,it silently installs when a user clicks.Android securitydisplays a message requesting the user to enable the Streaming Video Optimization (SVO). By clicking ‘OK’,the malware will gain accessibilityservice permission. Once that happens, Lucy canencrypt the data on the victim’s device.
Figure 2. Lucy popup cheating message
Inside the MainActivity module, the application triggers the malicious service, which then registers a BroadcastReceiver that is called by the command action.SCREEN_ON and then calls itself.
This is used to acquire the ‘WakeLock’ and ‘WifiLock’ service:
WakeLock: which keeps the device’s screen on;WifiLock: which keeps the wifi on.
Unlike previous versions of malware,TheC&Cservers is a domain, not an IP address.Even if the server is blocked, it can easily resolve a new IP address.
Figure 4. C&C servers
Figure 5. The Lucy use C&C servers
Figure 6: The Lucy Command & Control
Figure 7: Git device directory
Figure 8: Lucy encryption/decryption function
Once Lucy encrypts the infected device, a ransom message pops up in the browser, claiming the message is from the US Federal Bureau of Investigation (FBI), due to pornographic content found on the device.The victim is instructedto pay a $500 fine by entering credit card information, instead of the more common Bitcoin method.
Malicious viruses have been evolving. They are more diverse and efficient than ever.Sooner or later,mobilewill be a massive ransomware attack platform.
Tips for Prevention
1.Download and install trusted applications only2.Don’t click on any aplication of unnknown origin,3.Make regular, non-local backups of important files,4.Install anti-virus software
Website Malware Removal
Website Malware Scanner
Tags: android security,ransomware,Ransomware attacks
Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks, many companies today are looking for greater protection of their decentralized computing work environments from their Managed Service Providers (MSPs). As a result, MSPs need to deliver firewall solutions that are designed…
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is increasingly true for EU member states and the organizations that are based in or operate from these countries. The number of cyber-attacks targeting EU member states has risen. The…
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as that of a pandemic. This means that a building doesn’t necessarily have to be demolished or lives have to be lost for an unforeseen event to completely…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP