Monday, January 18, 17:05
Home security Microsoft: Android ransomware is activated when you press the Home button

Microsoft: Android ransomware is activated when you press the Home button

A new strain of mobile ransomware is abusing the mechanisms behind the notification of an "incoming call" and the "Home" button to lock the screens of your devices. Under the name AndroidOS / MalLocker.B, ransomware is hidden in Android applications that are available for download on online forums and third party websites.

Like most Android ransomware executives, MalLocker.B does not actually encrypt the victim's files, but simply prevents access on the rest of the phone.

Microsoft ransomware

Once installed, the ransomware consumes its screen phone and prevents the user from closing / rejecting the ransom note - which is designed to look like a message from local law enforcement telling them users that they have committed a crime and must pay a fine.

The ransomware that represents its fake fine police has been the most popular form of Android ransomware for over half a decade.

Over time, these malware strains have been misused several times functions of Android operating systems to keep users locked on their home screen.

Previous techniques have included abusing the System Alert window or disabling the functions associated with the rest of the buttons of the phone.

MalLocker.B comes with a new variation of these techniques.

The ransomware uses two parts to show their note ransoms.

The first part abuses the "call" notification. This is the function that is activated for incoming calls to display caller details and MalLocker.B uses it to display a window covering the entire screen area with details about the incoming call.

The second part abuses the "onUserLeaveHint ()" function. This feature is called when users want to send an application to the background and switch to a new application and is activated when you press buttons such as Home or Recents. MalLocker.B is abusing this feature to bring the ransom note back to the forefront.

The abuse of these two functions is a new one trick which has never been found again, but ransomware that violates the button Home has appeared in the past.

For example, in 2017, ESET discovered an Android ransomware strain called DoubleLocker that abused the accessibility service to reactivate it after users pressed the Home button.

Users are advised to avoid installing Android applications that have been downloaded from third-party sites, such as forums, ads websites or unauthorized stores third party applications.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

Scotland Environment Service: ransomware continues to affect us

The Scottish Environmental Protection Agency (SEPA) has confirmed that it was hit by a ransomware attack last month and continues to face ...

Backdoors and vulnerabilities were discovered in FiberHome routers

Backdoors and other vulnerabilities have been discovered in the firmware of a popular FiberHome FTTH ONT router. FTTH ONT stands for Fiber-to-the-Home Optical Network ...

GitHub apologizes to an employee who fired! What happened;

GitHub has admitted that it was wrong to fire a Jewish official who made "anti-Nazi" comments about the Capitol riots.

By 2030 AI will replace the people of cybersecurity

Security company Trend Micro recently conducted a new survey that reveals that more than two-fifths (41%) of IT leaders believe ...

Chinese Winnti APT targets organizations in Russia and other countries!

Security researchers at Positive Technologies have uncovered a series of attacks carried out by a Chinese APT hacking team targeting organizations in Russia ...

Silicon Valley is investing a huge amount of money in India

From March to November, even when COVID-19 destroyed economies around the world, the richest man in India ...
00:02:01

Microsoft, Salesforce, Oracle are designing a digital vaccination passport

A Covid digital vaccination passport is being developed jointly by a team of health and technology companies, as well as governments, airlines and ...

Google removes Chrome Sync from third-party browsers

Google says it will block the use of private Google APIs by third-party Chromium web browsers after discovering that ...

Medical records of railway workers and drivers were leaked

UPS and Norfolk Southern are examining whether the medical records of employees were compromised, after the publication of health data of truck drivers and employees ...

Siemens: Product Vulnerabilities Allow Arbitrary Code Execution!

Last week, Siemens informed its customers that some of its product development solutions are affected by twelve vulnerabilities, the ...