Skip to main content

Cyber Police ransomware can lock your Android device and ask for payment

android cyber police ransomware news nearly a billion phones could be hackable with single text message
Image used with permission by copyright holder
An exploit called “Cyber Police” has been in the wild for sometime, but a new method it is utilizing can now affect millions of Android devices. It will it lock your device, rendering it useless, and it can be installed on a device without any user interaction from the victim.

Cyber Police, a form of ransomware, was recently discovered by Blue Coat Labs and confirmed by Zimperium Labs, the same group that discovered the StageFright hack.

What is ransomware?

Ransomare is software with malicious code that can lock a device or computer so that it cannot be used. This means that you won’t be able to open any apps or access the settings on the device. A message usually appears explaining the device is locked and that you need to pay a “ransom” in order to unlock it and get rid of the malicious software.

The good news is that your data is usually safe, but the bad news is that paying the ransom won’t actually remove the software.

The Cyber Police hack explained

Cyber_Police_Android_Ransomware_Screenshot_01The Cyber Police name comes from how it represents itself once it’s active on your device. You’ll see a message like the one below explaining that your device has been locked because you supposedly have browsed illegal websites in the past.

The message claims to come from some sort of agency, which might be called the “American national security agency” or something similar.

This “agency” will give you a certain amount of time to pay a “ransom” so that it doesn’t take legal action, and as an extra bonus, the “agency” will restore your device. In this example, the “ransom” is two $100 Apple iTunes gift card codes. Sounds simple enough, but you were never under any legal threat in the first place, and paying the ransom won’t unlock your device.

Cyber_Police_Android_Ransomware_Screenshot_02The scary part of this exploit is that it can be installed on your device from a simple ad on a Web page, without the need for you to actually open it. And there is no way to detect these malicious ads. Andrew Brandt, director of threat research at Blue Coat Labs said, “This is the first time, to my knowledge [that] an exploit kit has been able to successfully install malicious apps on a mobile device without any user interaction on the part of the victim.” Since the exploit is actually an app, you would think that permissions would have to be approved, but somehow they are bypassed.

After the hack was discovered by Blue Coat, Joshua Drake from Zimperium labs analyzed it and found out the app uses a root tool known as Towelroot to take control of your device. It also utilizes certain exploits that were leaked during the Hacking Team breach. The Hacking Team, based in Milan, Italy, sells surveillance capabilities to local enforcement agencies, governments, and private companies. A breach of the Hacking Team’s own data in July 2015 revealed several exploits that hackers were able to use.

According to Blue Coat, The Cyber Police trojan was first documented in December 2015, but this newer method might have been in existence since February 2016.

Affected devices

The good news is that if you use an Android device that isn’t much more than a year old, you’re probably okay. This exploit can only affect Android versions 4.0.3 to 4.4.4. That’s Ice Cream Sandwich (2011) to KitKat (2013). Thankfully, most newer phones have already been upgraded to Lollipop (2014) or higher. However, according to the latest Android dashboard (April 4, 2016), 56.9 percent of all Android devices fall into these version numbers. That means more than 500 million Android devices are affected worldwide. Because of the terrible rate most Android phones get updates, these devices will most likely never get updated again, so they will always be vulnerable to the threat.

Blue Coat found the exploit on an older Samsung tablet running CyanogenMod 10, which was based on Android 4.2.2. Although CyanogenMod is a custom ROM, you don’t need to have one installed in order for the trojan app to take over your device.

Protecting yourself

Assuming you have an Android device running one of the affected software versions, there isn’t much you can do to completely block an attack. However, there are a few things you can do that might limit your chances of falling victim.

The first and most obvious thing to do is buy a newer device, since your current phone or tablet probably won’t get updated with a patch. Of course, that might not be feasible at the moment, so you can try to avoid shady websites. Those are the ones that are more likely to have the type of ads that can install the trojan app on your device. It’s unlikely these ads will appear on well known sites like Google, CNN, Amazon, ESPN, or Digital Trends (don’t leave us!). One other thing you can try is to install a newer browser app like Chrome, which could potentially block malicious ads from infecting your system.

Lastly, no matter what you do, make sure you regularly backup all your pictures, videos, music, and other important files. Although the Cyber Police attack probably won’t delete them from your device, you might not have access to them while the exploit is in place.

Removing the exploit

The is some uncertainty here, but there is at least some hope. The first thing you need to know is to never pay a ransom some computer program throws at you no matter what. You’ll only lose money because your device will remain useless.

According to Brandt at Blue Coat Labs, he was able to factory reset the Samsung tablet to successfully remove the trojan app. Unfortunately a factory reset results in all data on the device being erased. It’s a pain, but it’s the best option. If your data isn’t already backed up, you can try to connect your phone or tablet to a desktop or laptop and see if you can copy the contents before initiating a factory reset.

Since you won’t be able to get into the settings, you’ll need to initiate a factory reset a little differently. Each device differs slightly, but try this on Samsung devices:

  1. Press and hold the Power button, Volume Up button and Home key while the device is turned off.
  2. Once the Samsung logo appears, release only the Power Button.
  3. The Android system recovery screen will appear.
  4. Use the Volume buttons to highlight wipe data/factory reset.
  5. Press the Power button to select the factory reset option.

Some users have indicated that they were unable to factory reset there device because the trojan app prevented them from doing so. You also might be in a situation where you don’t have a backup of your data and you were unable to access the data while connecting your device to a computer. In either of these cases, you can try to reboot your device into safe mode. By doing so, you’ll be able to open Settings, followed by the Applications, and Applications Manager to delete the trojan app. Unfortunately figuring out the trojan app won’t be easy though.

Here’s how to reboot your device into safe mode:

  1. While your device is on, press and hold the power button for a few seconds until you get the prompt to turn off your phone.
  2. Tap and hold the Power Off option on the display for a few seconds until you get the prompt to confirm that you want to reboot into safe mode.

Once you’re in safe mode, open the Application Manager and look for any app under the Downloaded  tab that you don’t recognize and delete it. Unfortunately this will probably be harder than it sounds, but it’s worth a shot. Once you’re all set, just turn off the phone or tablet as you normally do and turn it on to reboot it in its normal state. Hopefully the trojan app will be gone and your phone will be unlocked. You can always repeat the process and try again.

If you’re unable to factory reset your device or delete the trojan app, it might be time to get a new one.

Editors' Recommendations

Robert Nazarian
Former Digital Trends Contributor
Robert Nazarian became a technology enthusiast when his parents bought him a Radio Shack TRS-80 Color. Now his biggest…
One of the biggest Oura Ring competitors just did something huge
The Ultrahuman Ring Air and the Oura Ring, resting on a table.

Ultrahuman, the maker of the Ultrahuman Ring Air, is making its way to U.S. production grounds. The company is setting up a production facility in Indiana, which will mark the first time a smart ring from Ultrahuman will be assembled from scratch on U.S. soil.

“The UltraFactory will offer an end-to-end production capability and is based on the company’s first operational model of such a facility in India,” the company says.

Read more
Best Verizon new customer deals: Galaxy S24, iPhone and more
Verizon logo on a smartphone screen in a dark room and a finger touching it.

If you’re in the market for one of the best phones, or any new phone for that matter, you’re going to need a good carrier. Verizon has long been one of the most popular options, as it boasts one of the most reliable networks in the United States. It offers some of the best cell phone plans out there, and for new customers Verizon also offers some pretty impressive discounts on new phones. In many cases this means you can brand new, recently released phones entirely for free when signing up with Verizon. And that’s the case right now, as we’re currently seeing some of the best Verizon new customer deals we’ve seen. You can pretty easily land a new iPhone, Samsung Galaxy phone, and Google Pixel for free, and we’ve got all of the details on how to do so. If that sounds enticing, read onward and start shopping the best Verizon new customer deals available right now.
Free iPhone SE (3rd Gen)

The 2022 release of the Apple iPhone SE is yours for free when you sign up for a new 5G data plan on Verizon -- no trade-ins required. It's the best small smartphone in our list of the best smartphones with a 4.7-inch Liquid Retina display, but it doesn't sacrifice performance as it's powered by Apple's A15 Bionic chip that's also found in the iPhone 13 line and pre-installed with iOS 15. The latest iPhone SE is equipped with a single 12MP rear sensor and 7MP selfie camera, which are boosted by Apple's software to enable better photographs.

Read more
AirTags range: here’s how far the tracker can reach
An AirTag attached on a keyring

Apple AirTags are a helpful tool for tracking valuable possessions like wallets, keys, luggage, and backpacks. These tags employ various technologies that allow you to track your items from short and long distances using your compatible Apple device, such as an iPhone 15 Plus. You might wonder how far you can track your items with AirTags. It's time to find out.
AirTags range, explained

The range of AirTags varies depending on the method you use to locate them. A Bluetooth connection will work when your AirTags are close to your supported Apple device. Otherwise, Apple's Find My network is utilized. Luckily, you don't have to choose the method because it's selected behind the scenes automatically.

Read more