HackDig : Dig high-quality web security articles for hackers

ChastityLock ransomware targeted men's Bluetooth chastity belt

2021-01-09 11:49

The source code for the ChastityLock ransomware that targeted male users of a specific adult toy is now publicly available for research purposes.

Users of the Bluetooth-controlled Qiui Cellmate chastity device were targets of an attack with this malware last year after security researchers found a vulnerability in the toy that allowed locking it remotely.

All users could be locked

Qiui Cellmante is a connected sex toy with a companion app to control its locking/unlocking via Bluetooth that is typically managed by someone else than the person wearing the device.

In October 2020, researchers at Pen Test Partners published details about a serious vulnerability that allowed a remote attacker to take control of any Qiui Cellmate device.

They found that making a request to any API endpoint did not require authentication and that using a six-digit "friend code" would return "a huge amount of information about that user," such as location, phone number, plain text password.

source: Pen Test Partners

"It wouldn’t take an attacker more than a couple of days to exfiltrate the entire user database and use it for blackmail or phishing," Pen Test Partners wrote in their report.

Following the disclosure, an attacker started targeting Qiui Cellmate mobile app users who controlled the smart toy and locked the chastity device. Victims were asked to pay 0.02 bitcoins, around $270 at the time of the attacks.

source VXUnderground

Researcher VXUnderground told BleepingComputer that they published the source code for ChastityLock ransomware after receiving it from someone who got it from the attacker.

The malware includes code that communicates to Qiui's API endpoints to enumerate user info as well as to send messages to the victim app and add friends, according to analysis from Sonatype senior security researcher Ax Sharma.

Mocking victims

Soon after the attacks started, a flood of complaints came from victim users reporting that they could no longer control the smart adult toy. Some of them fell victim to the attacker multiple times.

From screenshots seen by BleepingComputer, the attacker engaged victims after locking the chastity devices they controlled. The attacker also mocked victims when they asked what had happened, saying that they used magic to take control of the smart adult toy.

Some users were concerned that the only way to remove the Cellmate device was by cutting it off since there was no manual override for the Bluetooth lock.

However, cutting the hardened steel used for the lock required an angle grinder, and given the sensitive area, this was far from an option for victims.

Luckily, an emergency escape was available that involved only a screwdriver. A video from Qiui came to the rescue of locked users, showing them how to escape Cellmate without using the mobile app. This came with voiding the product warranty.


Source: tsahc-htooteulb-snem-detegrat-erawmosnar-kcolytitsahc/ytiruces/swen/moc.retupmocgnipeelb.www

Read:259 | Comments:0 | Tags:Security ransomware

“ChastityLock ransomware targeted men's Bluetooth chastity belt”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Tools

Tag Cloud