{"id":51858,"date":"2016-08-08T11:45:16","date_gmt":"2016-08-08T18:45:16","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=51858"},"modified":"2025-05-28T23:06:58","modified_gmt":"2025-05-29T06:06:58","slug":"cat-loving-mobile-ransomware-operates-control-panel","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/","title":{"rendered":"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel"},"content":{"rendered":"<p>Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a web-based control panel service. The malware is running on a legitimate cloud service provider.<\/p>\n<p>The payload of this malware can encrypt a victim\u2019s files, steal SMS messages, and block access to the device. In this variant the malware\u2019s authors include a picture of a cat:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51865 size-medium\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png\" alt=\"20160808 ElGato 1\" width=\"180\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-1-180x300.png 180w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-1.png 493w\" sizes=\"auto, (max-width: 180px) 100vw, 180px\" \/><\/a><\/p>\n<p>The ransomware constantly requests commands from the control server via HTTP, and the malicious server responds with the attackers\u2019 instructions defined in the control panel. All of this traffic is transmitted without encryption.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51864 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-2.png\" alt=\"20160808 ElGato 2\" width=\"557\" height=\"429\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-2.png 557w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-2-300x231.png 300w\" sizes=\"auto, (max-width: 557px) 100vw, 557px\" \/><\/a><\/p>\n<p>The commands that this threat can receive and perform are described in the following table:<\/p>\n<table width=\"618\">\n<tbody>\n<tr>\n<td width=\"78\"><strong>Command<\/strong><\/td>\n<td width=\"156\"><strong>Tag<\/strong><\/td>\n<td width=\"384\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>0<\/strong><\/td>\n<td width=\"156\">Read commands<\/td>\n<td width=\"384\">HTTP request to control server for new commands<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>1<\/strong><\/td>\n<td width=\"156\">Send SMS message<\/td>\n<td width=\"384\">Send message from infected device<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>2<\/strong><\/td>\n<td width=\"156\">Remove all SMS<\/td>\n<td width=\"384\">Forward and delete all SMS messages<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>3<\/strong><\/td>\n<td width=\"156\">Encrypt SD files<\/td>\n<td width=\"384\">Encrypt all files on SD card and add extension <em>.<\/em>enc<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>4<\/strong><\/td>\n<td width=\"156\">Encrypt path in SD<\/td>\n<td width=\"384\">Encrypt all files on SD card in a specific path with extension <em>.<\/em>enc<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>5<\/strong><\/td>\n<td width=\"156\">Decrypt SD files<\/td>\n<td width=\"384\">Decrypt affected files on SD card that contain extension <em>.<\/em>enc<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>6<\/strong><\/td>\n<td width=\"156\">Decrypt path in SD files<\/td>\n<td width=\"384\">Decrypt files in a specific path on SD card<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>7<\/strong><\/td>\n<td width=\"156\">Lock<\/td>\n<td width=\"384\">Lock screen<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>8<\/strong><\/td>\n<td width=\"156\">Exit<\/td>\n<td width=\"384\">Kill application and exit<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Reading commands from the control server:<\/h2>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51863 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-3.png\" alt=\"20160808 ElGato 3\" width=\"975\" height=\"602\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-3.png 975w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-3-300x185.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-3-768x474.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/a><\/p>\n<p>Some interesting features of this ransomware include the ability to encrypt specific files, steal SMS messages while forwarding them to the attacker and avoiding the victim\u2019s message visualization, lock access to the device and the encryption using an AES algorithm with a hardcoded password. Unlike asymmetric encryption, using a hardcoded password makes decryption trivial. Moreover, the application code contains a method to decrypt the affected files; thus this ransomware app can be forced to decrypt files if one invokes the appropriate method.<\/p>\n<h2>Decrypting the affected files:<\/h2>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51862 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-4.png\" alt=\"20160808 ElGato 4\" width=\"1288\" height=\"508\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-4.png 1288w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-4-300x118.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-4-768x303.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-4-1024x404.png 1024w\" sizes=\"auto, (max-width: 1288px) 100vw, 1288px\" \/><\/a><\/p>\n<p>The malicious server control panel for the botnet allows several remote commands:<\/p>\n<ul>\n<li>Lock\/unlock the screen (with a cat image).<\/li>\n<li>Send SMS messages to the victim.<\/li>\n<li>Encrypt\/decrypt SD card memory files (with a hardcoded password).<\/li>\n<li>Silently steal SMS messages from the victim\u2019s device.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-51861 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-5.png\" alt=\"20160808 ElGato 5\" width=\"961\" height=\"409\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-5.png 961w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-5-300x128.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-5-768x327.png 768w\" sizes=\"auto, (max-width: 961px) 100vw, 961px\" \/><\/a><\/p>\n<p>McAfee Labs has informed the owners of the abused servers and has requested they take down the malicious service.<\/p>\n<p>This ransomware variant looks like a demo version used to commercialize malware kits for cybercriminals because the control server interface is not protected and includes in the code words such as <em>MyDificultPassw. <\/em><\/p>\n<p>These kinds of threats are usually distributed by attackers who buy exploit kits on black markets and who want to attack a specific company or group of people. The attackers often use phishing campaigns, Trojanized apps, social media networks, or other social engineering techniques.<\/p>\n<p>McAfee Mobile Security detects this Android threat as Android\/Ransom.ElGato and alerts mobile users if the malware is present, while protecting them from any data loss. <a href=\"http:\/\/www.mcafeemobilesecurity.com\">Follow this link<\/a> for more information about McAfee Mobile Security.<\/p>\n<p>For help in combatting ransomware, <a href=\"https:\/\/www.nomoreransom.org\/\">follow this link<\/a> to the site <a href=\"https:\/\/www.nomoreransom.org\/\">No More Ransom!<\/a><\/p>\n<p>To keep up with the latest security threats, follow <a href=\"https:\/\/twitter.com\/McAfee\">@McAfee<\/a> on Twitter and like us on <a href=\"https:\/\/www.facebook.com\/McAfee\">Facebook<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a&#8230;<\/p>\n","protected":false},"author":833,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[37,76,180,214,4549],"coauthors":[2035],"class_list":["post-51858","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-android","tag-cybercrime","tag-malware","tag-mobile-security1","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a web-based control panel\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a web-based control panel\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-08T18:45:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T06:06:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"493\" \/>\n\t<meta property=\"og:image:height\" content=\"821\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fernando Ruiz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Ruiz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/\"},\"author\":{\"name\":\"Fernando Ruiz\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0ed97a1d0ce0c90c2a9ef2fbab555922\"},\"headline\":\"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel\",\"datePublished\":\"2016-08-08T18:45:16+00:00\",\"dateModified\":\"2025-05-29T06:06:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/\"},\"wordCount\":520,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png\",\"keywords\":[\"android\",\"cybercrime\",\"malware\",\"mobile security\",\"ransomware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/\",\"name\":\"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png\",\"datePublished\":\"2016-08-08T18:45:16+00:00\",\"dateModified\":\"2025-05-29T06:06:58+00:00\",\"description\":\"Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a web-based control panel\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0ed97a1d0ce0c90c2a9ef2fbab555922\",\"name\":\"Fernando Ruiz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/5b6dec450e97e87f9a57fae15bae5d34\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7fa953f9b978dc1f77d7abb273aa5ec1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7fa953f9b978dc1f77d7abb273aa5ec1?s=96&d=mm&r=g\",\"caption\":\"Fernando Ruiz\"},\"description\":\"Fernando Ruiz is a Security Researcher in McAfee Labs. He specializes in mobile threats and Android malware. Ruiz performs deep analysis and reverse engineering of malicious code, packers, and vulnerabilities; and creates detection technologies to proactively protect people against a wide spectrum of malware and potentially unwanted programs.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/fernando-ruiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel | McAfee Blog","description":"Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a web-based control panel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel | McAfee Blog","og_description":"Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a web-based control panel","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-08T18:45:16+00:00","article_modified_time":"2025-05-29T06:06:58+00:00","og_image":[{"width":493,"height":821,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160808-ElGato-1.png","type":"image\/png"}],"author":"Fernando Ruiz","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Fernando Ruiz","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/"},"author":{"name":"Fernando Ruiz","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0ed97a1d0ce0c90c2a9ef2fbab555922"},"headline":"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel","datePublished":"2016-08-08T18:45:16+00:00","dateModified":"2025-05-29T06:06:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/"},"wordCount":520,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png","keywords":["android","cybercrime","malware","mobile security","ransomware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/","name":"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png","datePublished":"2016-08-08T18:45:16+00:00","dateModified":"2025-05-29T06:06:58+00:00","description":"Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a web-based control panel","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160808-ElGato-1-180x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cat-loving-mobile-ransomware-operates-control-panel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"\u2018Cat-Loving\u2019 Mobile Ransomware Operates With Control Panel"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/0ed97a1d0ce0c90c2a9ef2fbab555922","name":"Fernando Ruiz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/5b6dec450e97e87f9a57fae15bae5d34","url":"https:\/\/secure.gravatar.com\/avatar\/7fa953f9b978dc1f77d7abb273aa5ec1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fa953f9b978dc1f77d7abb273aa5ec1?s=96&d=mm&r=g","caption":"Fernando Ruiz"},"description":"Fernando Ruiz is a Security Researcher in McAfee Labs. He specializes in mobile threats and Android malware. Ruiz performs deep analysis and reverse engineering of malicious code, packers, and vulnerabilities; and creates detection technologies to proactively protect people against a wide spectrum of malware and potentially unwanted programs.","url":"https:\/\/www.mcafee.com\/blogs\/author\/fernando-ruiz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/833"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=51858"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51858\/revisions"}],"predecessor-version":[{"id":214668,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51858\/revisions\/214668"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=51858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=51858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=51858"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=51858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}