Summary is AI-generated, newsdesk-reviewed
  • Zimperium's zLabs uncovers DroidLock ransomware targeting Android users with full device takeover.
  • DroidLock utilises phishing to bypass Android safeguards and exploits Accessibility Services for control.
  • Malware uses dual overlay mechanisms to steal credentials and demands payment via full-screen overlays.

Zimperium's zLabs team has discovered an evolving Android malware campaign named DroidLock, which is currently targeting users in Spain.

This malware distinguishes itself by exhibiting features more commonly associated with full-scale ransomware, such as the ability to take complete control of a device. This includes capabilities like screen-locking overlays, credential theft, and remote control.

Android safeguards

The deployment of DroidLock begins with phishing websites that distribute a dropper app

The deployment of DroidLock begins with phishing websites that distribute a dropper app. This malicious app is crafted to bypass Android’s built-in security measures and exploit Accessibility Services.

Once the malware is installed, it stealthily obtains additional permissions, granting itself access to SMS, call logs, contact lists, audio recordings, and more, all without the user's knowledge.

HTTP and WebSocket channels

After installation, DroidLock establishes persistent communication with its command-and-control server, utilising both HTTP and WebSocket channels.

Through these channels, attackers can execute any of 15 distinct commands, which allow them to perform actions such as locking the device, altering the device's PIN or password, conducting a factory reset, capturing images silently with the front camera, muting notifications, limiting user interaction, and even streaming and remotely controlling the device's screen using VNC.

Dual overlay mechanisms

The malware can present a misleading Android system update screen to keep victims from interrupting

A key strategy employed by DroidLock involves dual overlay mechanisms for stealing lock-patterns and application credentials. The malware uses quick in-memory overlays to capture screen unlock patterns and employs WebView-based overlays to display attacker-controlled HTML pages designed to steal credentials from specific apps.

Furthermore, the malware can present a misleading Android system update screen to keep victims from interrupting the attack or turning off their devices. While the ransomware overlay does not encrypt files, DroidLock has the capacity to fully wipe a device, locking the user out indefinitely and permitting prolonged control by the attacker.

Intercept one-time passcodes

For enterprises, a compromised device becomes a hostile endpoint,” said Vishnu Pratapagiri, a Security Researcher at Zimperium and the author of the analysis.

DroidLock can intercept one-time passcodes, change device credentials, wipe data, and remotely control the user interface. Organisations need mobile security that stops these attacks before they disrupt operations or enable account takeover.”

Understand how converged physical and cybersecurity systems can scale protection.

In case you missed it

Why open matters in the age of AI
Why open matters in the age of AI

Artificial intelligence (AI) creates efficiencies throughout various industries, from managing teams to operating businesses. Key outcomes include faster investigations, fewer fals...

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...