Monday, May 19, 2025
HomeRansomwareHumorous Android ransomware force victim to speak unlock code

Humorous Android ransomware force victim to speak unlock code

Published on

SIEM as a Service

Follow Us on Google News

Android Malware which has admirable listening quality,  force victim to speak unlock code.

The latest variant of the Android ransomware named Android.Lockdroid.E is a great listener and it was identified by Symantec security team.

The threat utilizes speech acknowledgment APIs and requires its victims to talk an open code rather than the conventional strategy for writing it in.

- Advertisement - Google News

Device Infection

Once Android.Lockdroid.E infects a device it screws the victim out utilizing a SYSTEM sort window and after that shows a payment note.The payment note is composed in Chinese and gives guidance on the most proficient method to open the device.

The note gives a QQ instant messaging to contact keeping in mind the end goal to get further directions on how to pay the ransom and get an unlock code. Since the client’s device is locked, another device must be used to contact the cybercriminals behind the threat.

The note also instructs the victim to press a button, which starts the speech recognition functionality.

The malware stores the lock screen picture and the pertinent password in one of its Assets documents in encoded frame with extra padding. They could extricate the password utilizing an automated script.

While examining these most recent Android.Lockdroid.E variations, they observe a few execution bugs, for example, inappropriate speech acknowledgment purpose terminating and copy/paste blunders.

Obviously, the malware creators are persistently exploring different avenues regarding new strategies to accomplish their objective of blackmailing cash from their victims. For sure this isn’t the last trick we’ll see from this risk family.

force victim to speak unlock code

The malware utilizes third-party speech recognition APIs and contrasts the talked words heuristically with the expected password. On the off chance that the information coordinates, the malware expels the lock screen.

Common Defences On Mobile Threats

  • Give careful consideration to the permission asked for by applications.
  • Abstain from downloading applications from new locales and just install applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
  • Make frequent backups of important data.
  • Install anti-malware on their devices.

Also Read:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

GNU C(glibc) Vulnerability Let Attackers Execute Arbitrary Code on Millions of Linux Systems

Security researchers have disclosed a significant vulnerability in the GNU C Library (glibc), potentially...

Exploiting dMSA for Advanced Active Directory Persistence

Security researchers have identified new methods for achieving persistence in Active Directory environments by...

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Researchers Replicate Advanced Tactics and Tools of VanHelsing Ransomware

Cybersecurity researchers at AttackIQ have meticulously emulated the intricate tactics, techniques, and procedures (TTPs)...

TransferLoader Malware Enables Attackers to Execute Arbitrary Commands on Infected Systems

A formidable new malware loader, dubbed TransferLoader, has emerged as a significant cybersecurity threat,...