• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Android Security Latest Cybersecurity News Mobile security

Lucy malware encrypts android devices and demands for $500 as ransom

William Marshal Posted On April 29, 2020
23



Lucy android malware


If you had seen the movie ‘Lucy’ you would know how powerful she was, and that is exactly what the Russian made malware is capable of, sneaky, powerful, troublesome, and self destructible.

Android targeting malicious actors have now scaled up their malware-as-a-service (MaaS) business to encrypt files and enhance the ransomware operations. This hacking group is called the ‘Lucy’ and are Russians who introduced themselves using the Black Rose Lucy service, offering malware and botnet launching protocols as a service for Android devices.

The update on their MaaS will now allow the actors to encrypt the files in the infected devices and ask for a ransom through browsers. They have customized the message to be as of FBI’s and that the victims have been identified of storing adult content on their android devices. The actors are clouting on the fear a victim develops when they see a message from the legal entities instead of a hacker, and the picture of them being arrested or penalized for storing adult content and visiting adult websites, will lure them to make the payment. Additionally, the actors had also mentioned that the victim’s face has also been captured and is now the FBI cyber crime data base. If the victim is not paying the ransom in three days, the ransom is tripled.

Hackers are used to prefer bitcoins for the ransom; however, in the case of Lucy gang, they had requested for $500 as the initial payment.

Security researchers from Check Point had discovered the Black Rose Lucy Malware variants in September 2018, now they had identified around 80 different samples is distributed in the wild by the actors.

Tatyana Shishkova, an android security researcher from Kaspersky, have identified one of these sample in February 2020, she also had tweeted the four IP addresses used for C&C server.

As per bleeping computer’s discussion with the Check Point manager of mobile research, the malware is right now actively distributed in Soviet states only. The actors check for the country code of the device and then the malware is initiated. Once activated, Lucy will lure the users to activate their Accessibility Service in their android device using an alert that pops up requesting the user to enable the video streaming optimizations. 

“Inside the MainActivity module, the application triggers the malicious service, which then registers a BroadcastReceiver that is called by the command action.SCREEN_ON and then calls itself. This is used to acquire the ‘WakeLock’ service, which keeps the device’s screen on, and ‘WifiLock’ service, which keeps the WIFI on” – Check Point

Once Lucy is inside the device, it begins its encryption procedures by retrieving all the directories or /storage or /sdcard, thus moving to next potential storage space based on the failures. After successful identification of data, Lucy begins the encryption and also verifies the same after completion, thus obtaining successful encryption of all the file types without discrimination. Furthermore, after achieving the encryption the malware stores the decryption key in the device itself, and later if the ransom is paid, it sends the logs to the actors post decryption and deletes itself from the device.

As per Check Point researchers, Lucy can make calls, send a list of apps installed on the device, delete encryption keys, run remote shell on the device, displays payment declined messages, and self destructible after successful task completion.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit. 

Share the article with your friends


Lucy android malwareLucy android ransomware


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

23 Comments

sikis izle
December 19, 2020 at 5:52 pm
Reply

Thanks again for the blog article. Much thanks again. Keep writing. Sherry Jud Tawney


yabanci
December 19, 2020 at 8:55 pm
Reply

I like this site because so much useful material on here :D. Joelly Edik Kiri


yetiskin
December 19, 2020 at 10:40 pm
Reply

Excellent post! We will be linking to this particularly great post on our website. Keep up the great writing. Ninon Lon Alister


yabanci
December 20, 2020 at 12:07 am
Reply

Your means of explaining all in this post is truly good, all be capable of easily be aware of it, Thanks a lot. Janina Gerek Randell


altyazili
December 20, 2020 at 3:55 am
Reply

Pretty! This has been an extremely wonderful post. Thank you for providing this info. Corene Ernst Whitney


indir
December 20, 2020 at 5:32 am
Reply

Here are a few of the web pages we suggest for our visitors. Minnnie Izak Huldah


download
December 23, 2020 at 6:56 am
Reply

We came across a cool website which you may love. Take a appear should you want. Lissie Adelbert Romelle


web-dl
December 23, 2020 at 8:51 am
Reply

Very good article! We will be linking to this great content on our website. Keep up the good writing. Aundrea Milton Adams


ucretsiz
December 23, 2020 at 10:33 am
Reply

I enjoyed reading this. Nice read. I enjoyed reading this. This information is magnificent. Fina Bogey Roshan


bedava
December 23, 2020 at 12:08 pm
Reply

Thanks to my father who stated to me on the topic of this blog, this web site is actually remarkable. Delly Gaby Johnson


bedava
December 24, 2020 at 4:15 am
Reply

There is definately a great deal to find out about this subject. I really like all of the points you made. Emilie Ferris Fleischer


indir
January 11, 2021 at 10:20 pm
Reply

I am truly grateful to the owner of this site who has shared this impressive piece of writing at at this place. Faunie Pennie Talya


dizi
January 23, 2021 at 1:01 pm
Reply

Heya i am for the first time here. I found this board and I find It really useful & it helped me out a lot. Jennine Brian Tucky


yerli film izle
January 29, 2021 at 3:16 pm
Reply

Hello, its nice post concerning media print, we all understand media is a enormous source of data. Norene Kale Arlie


1080p
January 30, 2021 at 12:58 am
Reply

Magnificent website. Plenty of helpful info here. I am sending it to some buddies ans also sharing in delicious. And of course. Codi Alexis Lederer


yabanci
January 30, 2021 at 5:48 pm
Reply

Wow, superb weblog structure! How lengthy have you ever been blogging for? you make running a blog glance easy. The entire glance of your web site is great, let alone the content material! Dixie Willem Kenway


movie online
February 1, 2021 at 8:44 am
Reply

Unquestionably consider that which you said. Your favourite reason appeared to be on the internet the easiest factor to bear in mind of. I say to you, I definitely get annoyed at the same time as other people think about concerns that they plainly do not recognise about. You controlled to hit the nail upon the highest as neatly as outlined out the entire thing without having side effect , people could take a signal. Will probably be back to get more. Thank you| Tony Dud Sweet


AqcfSeessynor
February 4, 2021 at 5:31 pm
Reply

cialis for women side effects cialis 20mg П„О№ОјО· orginal cialis


filmkovasi
February 6, 2021 at 12:58 pm
Reply

I cannot thank you enough for the post. Thanks Again. Fantastic. Pamela Mead Oscar


bedava
February 7, 2021 at 8:25 am
Reply

I feel all your tips are fantastic! Break it up and list it down. It always looks better and much more readable when you compose your points that way. Thanks for the tips! Tamara Murry Shaddock


turkce
February 7, 2021 at 11:12 am
Reply

Greetings! Very useful advice in this particular post! It is the little changes which will make the biggest changes. Thanks a lot for sharing! Shari Gothart Katlin


bluray
February 7, 2021 at 1:56 pm
Reply

Do you mind if I quote a few of your articles as long as I provide credit and sources back to your weblog? Gladys Urban Junia


turkce
February 7, 2021 at 3:16 pm
Reply

Excellent post. I will be experiencing some of these issues as well.. Inna Cesar Jeggar


Leave a Reply to bedava Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search