
After the surge in attacks from encryption-based threats like CryptoLocker and Cryptowall, malware attacks that restrict access to a system have grown in numbers. These attacks have targeted both PC and Android ecosystems alike. LockDroid/PornDroid is a ransomware for Android that has been present since late 2014 and over time it has undergone a lot of changes.
Dell SonicWALL Threats Research team observed a new variant on the rise that adds a new component to the Android ransomware scene. In addition to the lockscreen that renders the infected mobile device unusable, this malware adds a PIN based Android lockscreen thereby preventing the user from unlocking the device. Even though the PIN is random, the attackers demand $500 as a ransom for unlocking the device and removing the lockscreen.
Infection Cycle
The malware requests for following permissions during installation:
Once installed, the app requests for Device Administrator privileges when it is clicked. With device administrator privileges an app can perform privileged tasks like erasing data or resetting lockscreen password on the device :
Granting Administrator Privileges also makes it difficult to remove said apps as the uninstall button turns un-clickable:
The malware then shows a lockscreen with FBI (Federal Bureau of Investigation) warning message thereby disabling general usability of the mobile device as all the control buttons are superceded by this lockscreen. In the background the malware starts to gather a suite of information from the device which is later used on the lockscreen making the lockscreen more "personal" for the user. The following are a few key pieces of data that are gathered:
At the time of writing this blog the server to which this malware communicates to is down, we could not see the dynamic lockscreen containing the above mentioned data elements.
The malware tries to communicate with the following domain:
It has the following Command and Control (C&C) related hardcoded data:
Lockscreen malware for Android have been a common occurence in the recent past, one such lockscreen malware by the name LockDroid/PornDroid has seen a number of changes and enhancements since its first discovery. The malware being analyzed is a new variant of this family and the following are few key similarities and differences with regards to the different versions:
The main aim of LockDroid/PornDroid is to extract ransom from the victims of infected devices, it has been evolving over time with new components that hinder its detection/analysis. We can expect more developments in future that would improve the damage caused by this threat and at the same time make it laborious to analyze and detect it easily.
Few safe and potent ways to avoid getting infected from this threat are:
Dell SonicWALL provides protection against multiple versions of this threat via the following signatures:
APK Package Details:
Share This Article

An Article By
An Article By
Security News
Security News