{"id":9786,"date":"2017-11-02T19:49:30","date_gmt":"2017-11-02T15:49:30","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=9786"},"modified":"2019-11-15T15:23:42","modified_gmt":"2019-11-15T11:23:42","slug":"lokibot-trojan","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/lokibot-trojan\/9786\/","title":{"rendered":"LokiBot: If not stealing, then extorting"},"content":{"rendered":"<p>Remember the Hydra of ancient mythology? The many-headed serpent that grew two heads when one was chopped off? A similarly dangerous beast has <a href=\"https:\/\/clientsidedetection.com\/lokibot___the_first_hybrid_android_malware.html\" target=\"_blank\" rel=\"noopener nofollow\">appeared<\/a> in the Android malware zoo.<\/p>\n<p><strong><\/strong><\/p>\n<h2>LokiBot as a banking Trojan<\/h2>\n<p><\/p>\n<p>How do ordinary banking Trojans behave? They present the user with a fake screen that simulates the mobile banking interface. Unsuspecting victims enter their login credentials, which the malware redirects to the attackers, giving them access to the accounts.<\/p>\n<p>How does LokiBot behave? Roughly the same way, but it simulates not only a banking app screen, but also WhatsApp, Skype, and Outlook client interfaces, displaying notifications purporting to come from these applications.<\/p>\n<p>This means that a person can receive a fake notification, supposedly from their bank, saying that funds have been transferred to their account, and seeing the good news. then log in to the mobile banking client for confirmation. LokiBot even makes the smartphone vibrate when it displays the notification about the alleged transfer, which helps hoodwink even clued-in users.<\/p>\n<p>But LokiBot has other tricks in store: It can open a browser, navigate to specific pages, and even use an infected device to send spam, which is basically how it distributes itself. Having pinched money from your account, LokiBot keeps going, sending a malicious SMS to all contacts in the phone book to infect as many smartphones and tablets as possible, and even replying to incoming messages if necessary.<\/p>\n<p>If an attempt is made to remove LokiBot, the malware reveals another facet: To steal funds from a bank account, it needs administrator rights; if you try to deny it permission, it mutates from a banking Trojan into ransomware.<\/p>\n<p><strong><\/strong><\/p>\n<h3>LokiBot as ransomware. How to unlock infected smartphone<\/h3>\n<p>In this case, LokiBot locks the screen and displays a message accusing the victim of viewing child pornography and demanding ransom; it also encrypts data on the device. Examining LokiBot\u2019s code, researchers discovered that it uses weak encryption and doesn\u2019t work properly; the attack leaves unencrypted copies of all files on the device, only under different names, so restoring the files is relatively simple.<\/p>\n<p>However, the device screen is still locked, and the malware creators ask for about $100 in Bitcoin to unlock it. But you don\u2019t have to oblige: After rebooting the device in safe mode, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lokibot-android-banking-trojan-turns-into-ransomware-when-you-try-to-remove-it\/\" target=\"_blank\" rel=\"noopener nofollow\">you can strip<\/a> the malware of administrator rights and delete it. To do so, you first need to determine which version of Android you have:<\/p>\n<ul>\n<li>Select <em><em>Settings<\/em><\/em>.<\/li>\n<li>Select the <em><em>General<\/em><\/em> tab.<\/li>\n<li>Select <em><em>About the device<\/em><\/em>.<\/li>\n<li>Find the line <em><em>Android version<\/em><\/em> \u2014 the numbers below it indicate your OS version<\/li>\n<\/ul>\n<p>To enable safe mode on a device with Version 4.4 to 7.1, do the following:<\/p>\n<ul>\n<li>Press and hold the power button until a menu appears with the option <em>Power off<\/em> or <em><em>Disconnect power source<\/em><\/em>.<\/li>\n<li>Press and hold <em><em>Power off<\/em><\/em> or <em><em>Disconnect power source<\/em><\/em>.<\/li>\n<li>In the <em><em>Turn on safe mode<\/em><\/em> menu that appears, click <em><em>OK<\/em><\/em>.<\/li>\n<li>Wait for the phone to reboot.<\/li>\n<\/ul>\n<p>Owners of devices with other versions of Android should look online for information about how to enable safe mode for their particular phone.<\/p>\n<p>Unfortunately, not everyone knows about this method of killing the malware: LokiBot victims have already coughed up nearly <a href=\"http:\/\/www.securityweek.com\/removal-attempt-turns-android-banking-trojan-ransomware\" target=\"_blank\" rel=\"noopener nofollow\">$1.5 million<\/a>. And with LokiBot available on the black market for a mere $2,000, it is likely that the criminals responsible have repaid their investment many times over.<\/p>\n<p><strong><\/strong><\/p>\n<h3>How to protect against LokiBot<\/h3>\n<p><\/p>\n<p>In effect, the measures that can be taken to protect against LokiBot are applicable to any mobile malware. Here\u2019s how to protect yourself:<\/p>\n<p>\u2013 Never click on suspicious links \u2014 that\u2019s how LokiBot spreads.<\/p>\n<p>\u2013 Download apps only via Google Play \u2014 but be cautious <a href=\"https:\/\/www.kaspersky.com\/blog\/dont-believe-google-play-ratings\/\" target=\"_blank\" rel=\"noopener nofollow\">even in the official store<\/a>.<\/p>\n<p>\u2013 Install a reliable security solution on your smartphone and tablet. Kaspersky Internet Security for Android detects all variants of LokiBot. With the paid version, there\u2019s no need to scan the smartphone after installing each new application.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.<\/p>\n","protected":false},"author":2458,"featured_media":9787,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[105,456,1545,1544,1543,433,521,241],"class_list":{"0":"post-9786","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-banking-trojan","10":"tag-encryptor","11":"tag-hybrid","12":"tag-lokibot","13":"tag-ransomware","14":"tag-threats","15":"tag-trojan"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/lokibot-trojan\/9786\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/lokibot-trojan\/11746\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/lokibot-trojan\/13167\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/lokibot-trojan\/12066\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/lokibot-trojan\/11693\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/lokibot-trojan\/14718\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/lokibot-trojan\/14447\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/lokibot-trojan\/19131\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/lokibot-trojan\/4375\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/lokibot-trojan\/20030\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/lokibot-trojan\/9740\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/lokibot-trojan\/9909\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/lokibot-trojan\/8480\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/lokibot-trojan\/15174\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/lokibot-trojan\/8828\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/lokibot-trojan\/18627\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/lokibot-trojan\/19019\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/lokibot-trojan\/19012\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2458"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=9786"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9786\/revisions"}],"predecessor-version":[{"id":14794,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9786\/revisions\/14794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/9787"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=9786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=9786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=9786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}