Skip to main content

Cyber Police ransomware can lock your Android device and ask for payment

android cyber police ransomware news nearly a billion phones could be hackable with single text message
Image used with permission by copyright holder
An exploit called “Cyber Police” has been in the wild for sometime, but a new method it is utilizing can now affect millions of Android devices. It will it lock your device, rendering it useless, and it can be installed on a device without any user interaction from the victim.

Cyber Police, a form of ransomware, was recently discovered by Blue Coat Labs and confirmed by Zimperium Labs, the same group that discovered the StageFright hack.

Recommended Videos

What is ransomware?

Ransomare is software with malicious code that can lock a device or computer so that it cannot be used. This means that you won’t be able to open any apps or access the settings on the device. A message usually appears explaining the device is locked and that you need to pay a “ransom” in order to unlock it and get rid of the malicious software.

The good news is that your data is usually safe, but the bad news is that paying the ransom won’t actually remove the software.

The Cyber Police hack explained

Cyber_Police_Android_Ransomware_Screenshot_01The Cyber Police name comes from how it represents itself once it’s active on your device. You’ll see a message like the one below explaining that your device has been locked because you supposedly have browsed illegal websites in the past.

The message claims to come from some sort of agency, which might be called the “American national security agency” or something similar.

This “agency” will give you a certain amount of time to pay a “ransom” so that it doesn’t take legal action, and as an extra bonus, the “agency” will restore your device. In this example, the “ransom” is two $100 Apple iTunes gift card codes. Sounds simple enough, but you were never under any legal threat in the first place, and paying the ransom won’t unlock your device.

Cyber_Police_Android_Ransomware_Screenshot_02The scary part of this exploit is that it can be installed on your device from a simple ad on a Web page, without the need for you to actually open it. And there is no way to detect these malicious ads. Andrew Brandt, director of threat research at Blue Coat Labs said, “This is the first time, to my knowledge [that] an exploit kit has been able to successfully install malicious apps on a mobile device without any user interaction on the part of the victim.” Since the exploit is actually an app, you would think that permissions would have to be approved, but somehow they are bypassed.

After the hack was discovered by Blue Coat, Joshua Drake from Zimperium labs analyzed it and found out the app uses a root tool known as Towelroot to take control of your device. It also utilizes certain exploits that were leaked during the Hacking Team breach. The Hacking Team, based in Milan, Italy, sells surveillance capabilities to local enforcement agencies, governments, and private companies. A breach of the Hacking Team’s own data in July 2015 revealed several exploits that hackers were able to use.

According to Blue Coat, The Cyber Police trojan was first documented in December 2015, but this newer method might have been in existence since February 2016.

Affected devices

The good news is that if you use an Android device that isn’t much more than a year old, you’re probably okay. This exploit can only affect Android versions 4.0.3 to 4.4.4. That’s Ice Cream Sandwich (2011) to KitKat (2013). Thankfully, most newer phones have already been upgraded to Lollipop (2014) or higher. However, according to the latest Android dashboard (April 4, 2016), 56.9 percent of all Android devices fall into these version numbers. That means more than 500 million Android devices are affected worldwide. Because of the terrible rate most Android phones get updates, these devices will most likely never get updated again, so they will always be vulnerable to the threat.

Blue Coat found the exploit on an older Samsung tablet running CyanogenMod 10, which was based on Android 4.2.2. Although CyanogenMod is a custom ROM, you don’t need to have one installed in order for the trojan app to take over your device.

Protecting yourself

Assuming you have an Android device running one of the affected software versions, there isn’t much you can do to completely block an attack. However, there are a few things you can do that might limit your chances of falling victim.

The first and most obvious thing to do is buy a newer device, since your current phone or tablet probably won’t get updated with a patch. Of course, that might not be feasible at the moment, so you can try to avoid shady websites. Those are the ones that are more likely to have the type of ads that can install the trojan app on your device. It’s unlikely these ads will appear on well known sites like Google, CNN, Amazon, ESPN, or Digital Trends (don’t leave us!). One other thing you can try is to install a newer browser app like Chrome, which could potentially block malicious ads from infecting your system.

Lastly, no matter what you do, make sure you regularly backup all your pictures, videos, music, and other important files. Although the Cyber Police attack probably won’t delete them from your device, you might not have access to them while the exploit is in place.

Removing the exploit

The is some uncertainty here, but there is at least some hope. The first thing you need to know is to never pay a ransom some computer program throws at you no matter what. You’ll only lose money because your device will remain useless.

According to Brandt at Blue Coat Labs, he was able to factory reset the Samsung tablet to successfully remove the trojan app. Unfortunately a factory reset results in all data on the device being erased. It’s a pain, but it’s the best option. If your data isn’t already backed up, you can try to connect your phone or tablet to a desktop or laptop and see if you can copy the contents before initiating a factory reset.

Since you won’t be able to get into the settings, you’ll need to initiate a factory reset a little differently. Each device differs slightly, but try this on Samsung devices:

  1. Press and hold the Power button, Volume Up button and Home key while the device is turned off.
  2. Once the Samsung logo appears, release only the Power Button.
  3. The Android system recovery screen will appear.
  4. Use the Volume buttons to highlight wipe data/factory reset.
  5. Press the Power button to select the factory reset option.

Some users have indicated that they were unable to factory reset there device because the trojan app prevented them from doing so. You also might be in a situation where you don’t have a backup of your data and you were unable to access the data while connecting your device to a computer. In either of these cases, you can try to reboot your device into safe mode. By doing so, you’ll be able to open Settings, followed by the Applications, and Applications Manager to delete the trojan app. Unfortunately figuring out the trojan app won’t be easy though.

Here’s how to reboot your device into safe mode:

  1. While your device is on, press and hold the power button for a few seconds until you get the prompt to turn off your phone.
  2. Tap and hold the Power Off option on the display for a few seconds until you get the prompt to confirm that you want to reboot into safe mode.

Once you’re in safe mode, open the Application Manager and look for any app under the Downloaded  tab that you don’t recognize and delete it. Unfortunately this will probably be harder than it sounds, but it’s worth a shot. Once you’re all set, just turn off the phone or tablet as you normally do and turn it on to reboot it in its normal state. Hopefully the trojan app will be gone and your phone will be unlocked. You can always repeat the process and try again.

If you’re unable to factory reset your device or delete the trojan app, it might be time to get a new one.

Robert Nazarian
Former Digital Trends Contributor
Robert Nazarian became a technology enthusiast when his parents bought him a Radio Shack TRS-80 Color. Now his biggest…
I love the Oura Ring 4, except for one big thing
Oura RIng 4 Silver Size 12 on a shelf

Since I had a heart attack four years ago at the age of 33, the Oura Ring has been a trusty sidekick for managing my health. First, it was the Oura Ring 2, and a few months later, the Oura Ring 3 became my go-to when it launched three years ago.

That’s changed this year as every company competes for a spot on our best smart rings list. The number of smart rings has grown exponentially this year, and many companies are launching first-generation or second-generation smart rings — offering viable alternatives to Oura. The company’s answer? The Oura Ring 4.

Read more
Don’t buy the Kindle Colorsoft, buy this e-reader instead
dont buy the kindle colorsoft onyx boox go color 7 instead 1

Everyone is talking about e-readers again, and it's because Amazon recently released a whole new bunch of Kindles. Of the new releases, one stands apart as something new for Amazon: The Kindle Colorsoft is the company's first attempt at a color e-ink display, and it replaces the long-forgotten Kindle Oasis as Amazon's new flagship e-reader device. At $280, it's certainly an expensive piece of kit — especially if you consider the basic Kindle costs almost a third of that. But it's quite simply the most advanced Kindle that Amazon has ever made.

So, does that mean you should buy it immediately? Absolutely not; I want you to buy something else instead.

Read more
Mega gaming phone’s specs look set to crush the competition
The Asus ROG Phone 8 Pro's mini-LED display on the back of the phone.

Asus is preparing to launch the ROG Phone 9 and 9 Pro in November, and we've been given a hint at the specificationa in an extensive leak ahead of the big day. The ROG Phone 9 and 9 Pro will both have 6.78-inch displays with a variable fresh rate up to 120Hz, according to YTechB. However, there's a dedicated "Game Genie" mode (which is an excellent name for a gaming phone feature) that can reach up to 185Hz — perfect for competitive games like Call of Duty Mobile. The screen resolution is 1080 x 2448 pixels, and the phone itself measures in at 163.77 by 76.78 by 8.9 mm.

As far as the processor goes, the ROG Phone 9 and 9 Pro will be powered by the Snapdragon 8 Elite chipset and the Adreno 830 GPU. Of course, they'll both sport Android 15, too. We aren't sure how many different configurations will be available, but it seems the ROG Phone 9 will have the option of 12GB of RAM and 512GB of storage, while the Pro model will likely have 16GB of RAM and 512GB storage. It's possible there will be other options, too.

Read more