Skip to main content

Charger - Zero-Day Mobile Ransomware

A new mobile ransomware has been discovered, hidden in an app called EnergyRescue on the Google Play store. Charger is a zero-day mobile ransomware application.
Report a cyber attack: call 0300 303 5222 or email [email protected]

This content has been archived

This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk

Summary

A new mobile ransomware has been discovered, hidden in an app called EnergyRescue on the Google Play store. Charger is a zero-day mobile ransomware application.

Affected platforms

The following platforms are known to be affected:

Threat details

It has managed to evade Google’s security controls and infiltrated the Google Play app store.

Researchers found the malware rooted in a fake utility app, EnergyRescue. The app advertised itself as a tool to help with a user’s battery life by scanning for and fixing weak cells. The app has now been removed from the Google Play Store although it is believed that the ransomware is also present in other apps. EnergyRescue was downloaded between 1,000,000 and 5,000,000 times during the four days it was present on the app store.

The ransomware has the capability to obtain access to contacts and SMS messages and can also compromise a user’s device by asking for admin permissions. If permissions are granted by the user, it will lock the device and display a ransom note.

The ransom note has a menacing tone, threatening to sell personal information on the black market if the demand for ransom is not met. The ransom is currently 0.2 Bitcoins (around £150) and the criminals also point out that they have already saved all of the user’s personal data to their servers. This information is said to include social network details, bank accounts as well as information about the user’s family and friends. Affected users are directed towards a Bitcoin wallet to make payment in exchange for their phone to be released.

It is interesting to note that the Charger ransomware does not activate if it learns that the device is located in Ukraine, Russia or Belarus. This indicates a possibility that the attackers are based in these countries or an attempt to evade prosecution in their home countries.


Remediation steps

Type Step
If an organisation deploys Android devices for employees to use on the network, it is recommended that safe usage mobile device policies are reiterated. This would need to include reminders to not download apps from third party app stores. In this instance, it could be beneficial to put a block in place to deter users from downloading malicious apps on corporate devices. In addition, it should be advised to not click on unknown links as phishing and smishing scams have developed advanced techniques and will direct users to download malware.

Last edited: 17 February 2020 11:27 am