Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
One of thefirst times the public witnessedfirsthandand realized the power of ransomware was when WannaCry broke out in 2017. The government, education, hospitals, energy, communications, manufacturing and many other key information infrastructure sectors suffered unprecedented losses.Looking back, thatwas just the beginning, as there have since been many versions, such asSimpleLocker, SamSam and WannaDecryptor for example.
Comodo’s Threat Research Labs has received news that the ‘Black Rose Lucy’ ransomware has new variants that are attacking AndroidOS.
Black Rose Lucy malware did not have ransomware capabilities at the time of its discovery by Check Point back inSeptember2018.At that time,Lucy was a Malware-as-a-Service(Maas) botnet and dropper for Android devices. Now, it’s back with new ransomware capabilities that allow it take control of infected devices to modify and install new malware applications.
When downloaded, Lucy encrypts the infected device and a ransom message pops up in the browser, claiming it is a message from the US Federal Bureau of Investigation (FBI) due to pornographic content found on the device.The victim is instructedto pay a $500 fine by entering credit card information, instead of the more common Bitcoin method.
Figure 1. Lucy ransomware used resource images.
Comodo Threat Research Center collected samples and conducted an analysis when we realized that Black Rose Lucy was back.
Disguised as a normal video player application, via media share links,it silently installs when a user clicks.Android securitydisplays a message requesting the user to enable the Streaming Video Optimization (SVO). By clicking ‘OK’,the malware will gain accessibilityservice permission. Once that happens, Lucy canencrypt the data on the victim’s device.
Figure 2. Lucy popup cheating message
Inside the MainActivity module, the application triggers the malicious service, which then registers a BroadcastReceiver that is called by the command action.SCREEN_ON and then calls itself.
This is used to acquire the ‘WakeLock’ and ‘WifiLock’ service:
WakeLock: which keeps the device’s screen on;
WifiLock: which keeps the wifi on.
Unlike previous versions of malware,TheC&Cservers is a domain, not an IP address.Even if the server is blocked, it can easily resolve a new IP address.
Figure 4. C&C servers
Figure 5. The Lucy use C&C servers
Figure 6: The Lucy Command & Control
Figure 7: Git device directory
Figure 8: Lucy encryption/decryption function
Once Lucy encrypts the infected device, a ransom message pops up in the browser, claiming the message is from the US Federal Bureau of Investigation (FBI), due to pornographic content found on the device.The victim is instructedto pay a $500 fine by entering credit card information, instead of the more common Bitcoin method.
Malicious viruses have been evolving. They are more diverse and efficient than ever.Sooner or later,mobilewill be a massive ransomware attack platform.
Tips for Prevention
1.Download and install trusted applications only
2.Don’t click on any aplication of unnknown origin,
3.Make regular, non-local backups of important files,
4.Install anti-virus software
Tags: Ransomware attacks,android security,ransomware
Reading Time: 2 minutes Ransomware is a dilemma that we have been facing for quite some time now. However, in 2020, we have seen a significant rise in the total number and variety of ransomware attacks. This latest ransomware boom is most probably the outcome of organized cyber-criminal networks recognizing the revenue-generating potential of this ‘business model’—amounting to over…
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting ready for Halloween parties and trick-or-treating. But ghosts and ghouls aren’t the only scary things you’ll be seeing this month: October is also National Cybersecurity Awareness Month, a time when business leaders and…
Reading Time: 3 minutes Two months have passed since the city of Baltimore was hit by the latest in a string of ransomware attacks targeting municipalities, and things still aren’t completely back to normal. The attack, perpetrated by an unknown cyber criminal, impacted over 10,000 municipal government-owned computers, and disrupted tax collection and city employees’ access to their email…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats