Microsoft warns of Android ransomware that activates when you press the Home button


A brand new pressure of cellular ransomware abuses the mechanisms at the back of the “incoming name” notification and the “House” button to fasten displays on customers’ gadgets.

Named AndroidOS/MalLocker.B, the ransomware is hidden inside of Android apps introduced for obtain on on-line boards and third-party internet sites.

Similar to maximum Android ransomware lines, MalLocker.B does not if truth be told encrypt the sufferer’s information however simply prevents get right of entry to to the remainder of the telephone.

As soon as put in, the ransomware takes over the telephone’s display screen and stops the person from pushing aside the ransom observe — which is designed to seem like a message from native legislation enforcement telling customers they dedicated against the law and want to pay a effective.


Symbol: Microsoft

Ransomware posing as pretend police fines has been the most well liked type of Android ransomware for greater than part a decade now.

Throughout time, those malware lines have abused quite a lot of purposes of the Android running methods so as to stay customers locked on their house display screen.

Previous tactics incorporated abusing the Gadget Alert window or disabling the purposes that interface with the telephone’s bodily buttons.

MalLocker.B comes with a brand new variation of those tactics.

The ransomware makes use of a two-part mechanism to turn its ransom observe.

The primary section abuses the “name” notification. That is the serve as that turns on for incoming calls to turn information about the caller, and MalLocker.B makes use of it to turn a window that covers all the space of the display screen with information about the incoming name.

The second one section abuses the “onUserLeaveHint()” serve as. This serve as is named when customers need to push an app into the background and turn to a brand new app, and it triggers when urgent buttons like House or Recents. MalLocker.B abuses this serve as to carry its ransom observe again into the foreground and save you the person from leaving the ransom observe for the house display screen or some other app.

The abuse of those two purposes is a brand new and never-before-seen trick, however ransomware that hijacks the House button has been viewed earlier than.

As an example, in 2017, ESET found out an Android ransomware pressure named DoubleLocker that abused the Accessibility provider to re-activate itself after customers pressed the House button.

Since MalLocker.B comprises code this is too simplistic and loud to make it previous Play Retailer evaluations, customers are prompt to steer clear of putting in Android apps they downloaded from third-party places similar to boards, website online advertisements, or unauthorized third-party app shops.

A technical breakdown of this new risk is to be had on Microsoft’s weblog.

Leave a Reply

Your email address will not be published. Required fields are marked *