Articles Cyberpunk 2077 Android Ransomware ! Encrypt ALL Android...

Cyberpunk 2077 Android Ransomware ! Encrypt ALL Android Files!


ThreatIT Reports for the second time after ThreatIT first article about CyberPunk2077 and after Kaspersky Lab specialists discovered malware that was disguised as a beta version of Cyberpunk 2077 for Android and was distributed via cyberpunk2077mobile [.] Com.

The site of the “mobile version” looked suspiciously like Google Play, and its creators claimed that the beta was released on the day the game was officially released. Allegedly, the “beta” has already been downloaded by about a thousand people, and some of them even left feedback, noting that the game is not bad for the beta version.


Although the website states that the application weighs 3.4 GB, when downloading the file, the file does not even reach 3 MB. When starting the application, first of all, it requires access to files on the device. In theory, the application may need these rights if the user wants to save or open something through it, but the game hardly needs photos and videos to start. However, the application cannot run without this permission. However, even if you give out all the rights to the fake, you won’t be able to play either: instead of Cyberpunk 2077, the victim will only see a message demanding a ransom.



In a note in broken English, the user is explained that now all his photos and other important files are encrypted. To restore them, you need to transfer $ 500 in bitcoins to the cybercriminals’ wallet. Otherwise, the malware will permanently delete the data and it will be impossible to recover it. It is also impossible to get rid of the ransomware, according to the ransomware: the files allegedly cannot be returned.

The researchers checked what actually happens to the files on the infected device. The threats were not empty: the files were indeed encrypted and assigned the .coderCrypt extension. In addition, the malware placed a README.txt file in each folder with the same note as in the application window.


However, it turned out to be possible to recover the files without the help of malefactors. The fact is that the malware uses the RC4 symmetric encryption algorithm. That is, to decrypt the data, you need the same key with which they were encrypted. In this case, the key was hardcoded into the application code. In all the samples that the experts came across, the key was: “21983453453435435738912738921”.


Experts also write that the authors of the fake beta Cyberpunk 2077 for Android are also distributing an encryptor for Windows disguised as the same game. The files encrypted by it can no longer be restored on their own, because the key is not hard-coded into the application code, but is randomly generated for each individual infection case. Perhaps this is precisely why they demand twice as much money from PC users as from victims of mobile malware.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Why Is It Important To Have Intrusion Detection And Prevention ?

This article describes why detection and prevention of burglaries...

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT...

Gitpaste-12: Linux bot armed with a dozen exploits

Researchers at Juniper Networks have discovered a Linux scripting...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It...

Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !

Network vulnerability assessment analyzes a variety of network issues,...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity,...

You might also likeRELATED
Recommended to you