HelDroid: Dissecting and Detecting Mobile Ransomware

Authors

Nicoló Andronio, Stefano Zanero, Federico Maggi

Venue

Proceedings of the 18th international conference on Research in Attacks, Intrusions, and Defenses (Lecture Notes in Computer Science), October 2015

Abstract

In ransomware attacks, the actual target is the human, as opposed to the classic attacks that abuse the infected devices (e.g., botnet renting, information stealing). Mobile devices are by no means immune to ransomware attacks. However, there is little research work on this matter and only traditional protections are available. Even state-of-the-art mobile malware detection approaches are ineffective against ransomware apps because of the subtle attack scheme. As a consequence, the ample attack surface formed by the billion mobile devices is left unprotected. First, in this work we summarize the results of our analysis of the existing mobile ransomware families, describing their common characteristics. Second, we present HelDroid, a fast, efficient and fully automated approach that recognizes known and unknown scareware and ransomware samples from goodware. Our approach is based on detecting the “building blocks” that are typically needed to implement a mobile ransomware application. Specifically, HelDroid detects, in a generic way, if an app is attempting to lock or encrypt the device without the user’s consent, and if ransom requests are displayed on the screen. Our technique works without requiring that a sample of a certain family is available beforehand. We implemented HelDroid and tested it on real-world Android ransomware samples. On a large dataset comprising hundreds of thousands of APKs including goodware, malware, scareware, and ransomware, HelDroid exhibited nearly zero false positives and the capability of recognizing unknown ransomware samples.

BibTeX

@inproceedings{Andronio2015HelDroid_Dissecting,
  title     = {{HelDroid: Dissecting and Detecting Mobile Ransomware}},
  author    = {Andronio, Nicoló and Zanero, Stefano and Maggi, Federico},
  booktitle = {Proceedings of the 18th international conference on Research in Attacks, Intrusions, and Defenses},
  series    = {Lecture Notes in Computer Science},
  month     = {November},
  year      = {2015},
  copyright = {©2015 Springer International Publishing Switzerland},
  doi       = {10.1007/978-3-319-26362-5_18},
  isbn      = {978-3-319-26361-8 978-3-319-26362-5},
  language  = {en},
  pages     = {382--404},
  publisher = {Springer International Publishing},
  url       = {https://doi.org/10.1007/978-3-319-26362-5_18}
}