Crooks in China have developed an Android ransomware that uses similar graphics to the WannaCry ransom note in an attempt to scare and trick users into quickly paying the ransom.
Spotted by Qihoo 360 researchers, crooks are spreading this ransomware via Chinese gaming forums. The malicious app containing the ransomware is disguised as a plugin for King of Glory, a very popular mobile game in China.
By the looks of it, the ransomware is obviously the work of amateur malware operators who have a fetish for getting arrested.
Unlike 99.9% of today's ransomware, this WannaCry lookalike for Android devices is asking users to pay the ransom fee of 40 Chinese Renminbi ($6) via Chinese payment providers QQ, Alipay, or WeChat.
Its authors have either not heard of Bitcoin before, or bumped their head and forgot they live in China, the country where authorities have the deeper access to data from technology firms.
It would take police minutes to track down who's on the receiving end of all the ransom payments and crack down on its operators.
Outside of the idiotic method of handling ransom payments, this WannaCry lookalike for Android is pretty solid code-wise.
For starters, the ransomware actually encrypts files, which is pretty impressive if we take into account that most Android ransomware is still at the screen-locker level.
The ransomware uses AES encryption to lock files, and it will append a suffix to all encrypted files consisting of a mixture of Chinese and Latin characters.
Because resources are limited on Android devices, the ransomware will only encrypt files under 10KB in size. To avoid ruining and crashing the Android OS, the ransomware doesn't encrypt files whose names start with a dot, or files located in folders that include ”android", "com", "DCIM", "download", or "miad" in their file path.
According to Nikolaos Chrysaidos, security researcher for Avast, this ransomware — which the company named WannaLocker — only encrypts files on the smartphone's external storage.