Tuesday, March 4, 2025
HomeRansomwareHumorous Android ransomware force victim to speak unlock code

Humorous Android ransomware force victim to speak unlock code

Published on

SIEM as a Service

Follow Us on Google News

Android Malware which has admirable listening quality,  force victim to speak unlock code.

The latest variant of the Android ransomware named Android.Lockdroid.E is a great listener and it was identified by Symantec security team.

The threat utilizes speech acknowledgment APIs and requires its victims to talk an open code rather than the conventional strategy for writing it in.

Device Infection

Once Android.Lockdroid.E infects a device it screws the victim out utilizing a SYSTEM sort window and after that shows a payment note.The payment note is composed in Chinese and gives guidance on the most proficient method to open the device.

The note gives a QQ instant messaging to contact keeping in mind the end goal to get further directions on how to pay the ransom and get an unlock code. Since the client’s device is locked, another device must be used to contact the cybercriminals behind the threat.

The note also instructs the victim to press a button, which starts the speech recognition functionality.

The malware stores the lock screen picture and the pertinent password in one of its Assets documents in encoded frame with extra padding. They could extricate the password utilizing an automated script.

While examining these most recent Android.Lockdroid.E variations, they observe a few execution bugs, for example, inappropriate speech acknowledgment purpose terminating and copy/paste blunders.

Obviously, the malware creators are persistently exploring different avenues regarding new strategies to accomplish their objective of blackmailing cash from their victims. For sure this isn’t the last trick we’ll see from this risk family.

force victim to speak unlock code

The malware utilizes third-party speech recognition APIs and contrasts the talked words heuristically with the expected password. On the off chance that the information coordinates, the malware expels the lock screen.

Common Defences On Mobile Threats

  • Give careful consideration to the permission asked for by applications.
  • Abstain from downloading applications from new locales and just install applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
  • Make frequent backups of important data.
  • Install anti-malware on their devices.

Also Read:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...