Friday, December 12, 2025
HomeTech NewsDroidLock Malware Warning: The New Android Threat That Locks Phones And Demands...

DroidLock Malware Warning: The New Android Threat That Locks Phones And Demands Cash

A new Android threat called DroidLock malware has started to appear in attacks against phone users. It works by locking the device screen and then showing a demand for money. Victims see a warning that says their files will be destroyed if they do not contact the criminal and pay within a set number of hours. The message is meant to scare the victim into quick payment, even though the malware does not encrypt files. It still prevents access to the phone, and that pressure alone makes it dangerous.

DroidLock Malware Targets Android Users With A New Form Of Phone Locking Scam

Threat researchers at Zimperium shared new findings about this threat in a detailed report. They say the main group of victims are Spanish speaking users. This detail is important because it shows that the attackers focus on a specific language group for higher success. The malware spreads through harmful websites that pretend to offer useful applications. These fake apps appear normal, but they hide a dropper that secretly installs the main payload.

Attackers use this method because it gives them more control over the installation process. Victims think they are installing a common app, but the hidden payload is waiting for a silent moment to install itself. When the dropper finishes, a second stage is downloaded and activated. That second stage runs the real DroidLock malware and begins its harmful work.

The Dropper Tries To Trick The User With Fake Update Requests

Zimperium explains that the infection starts with a fake update message. This message claims that the app needs a new feature or an improved version. When the victim allows the update, the main payload installs itself. The malware then asks the user to approve Device Admin permissions. These permissions give an app the power to act like a system tool. Once approved, the malware can lock the screen, change the security code, or block the victim from changing back their settings.

The malware also asks for Accessibility Services. These services are normally meant to support users with vision or movement challenges. However, criminals exploit them because these permissions let apps view screen content and perform actions without the user noticing. With both permissions granted, the malware can control nearly every part of the device. It can take actions that no normal app should perform without clear approval.

Once these permissions are granted, the victim has little control. The malware can wipe all data, lock the device, or change the phone’s PIN or password. It can even disable biometric options. This means the victim cannot unlock their phone with a fingerprint or face scan. For many users, this is the moment when panic begins.

DroidLock Malware Gives Criminals Full Remote Phone Access

The most concerning part of the DroidLock malware is its remote access feature. It uses VNC, which is a remote control system. With VNC active, the attacker can see the screen, move through the menu, open apps, and collect private content. They can also install more harmful tools if needed. For many victims, this means the criminal can observe messages, photos, call logs, and personal files without any visible signs.

DroidLock malware supports fifteen separate commands. These commands give the attacker full control. Some commands mute the device so the victim does not hear alerts. Others start the camera without any hint on screen. This means the attacker can capture photos or audio recordings without the victim’s knowledge. Another command orders the phone to reset all settings to factory mode. This action wipes everything on the device.

The ransomware part of the attack appears through a WebView window. This window covers the full screen so the victim cannot use the phone. It shows a demand to contact the attacker through a Proton email address. Proton email is used because it hides the sender. The message says that the user has twenty four hours to pay before the attacker destroys the files. The threat sounds serious, and many victims may think the files are encrypted. They are not encrypted, but the denial of access has the same effect. It blocks the victim from using their data.

Attackers Steal The Lock Pattern With A Fake Screen Overlay

One of the most alarming features of DroidLock malware is the lock pattern theft. Many Android users unlock their phones by drawing a pattern on the screen. The malware displays a fake pattern screen that looks exactly like the real one. When the victim draws the pattern, the malware captures the gesture and sends it to the attacker.

This stolen pattern has two uses. It lets the attacker unlock the device during quiet moments. It also lets the attacker use remote access tools more freely. They can open apps, read content, or change settings even when the phone has been idle for a long time. This gives the criminal full control with no need to request new permissions.

DroidLock malware stores the fake pattern screen inside the APK assets. This means the overlay loads instantly. The victim sees something normal and does not suspect a trap. By the time they realize the pattern was stolen, the attacker has already gained remote access.

Zimperium Shares The Findings To Protect Android Users

Since Zimperium is part of the App Defense Alliance, they share information with the Android security team. This helps Google react quickly. Play Protect now detects and blocks the malware on updated devices. This means users who keep their phones updated are safe from known versions of DroidLock malware. However, the threat will keep evolving, so users must remain cautious.

The team at SquaredTech notes that phone security depends heavily on permission awareness. When an app asks for Device Admin or Accessibility Services, the user should ask why the app needs them. Many common apps do not need high level permissions. Only a few system level tools require them, and they are easy to verify.

Attackers rely on the fact that many users approve permissions without reading the prompt. DroidLock malware uses this habit to gain control without raising suspicion.

How Android Users Can Stay Safe From DroidLock Malware

Experts give several safety steps to reduce the risk of infection.

Avoid installing APK files from unknown websites. Fake download pages are the main source of DroidLock malware. Only install apps from trusted stores and known publishers.

Check the permissions an app asks for. If an app requests control over the screen lock or full access to device settings, it should raise questions.

Use Play Protect and run regular scans. Play Protect can find known harmful apps and remove them in seconds.

Keep the device updated. Security patches help block new threats as they appear.

Do not respond to ransom messages. Paying a ransom does not guarantee access will be restored. Criminals may ask for more money or refuse to unlock the device.

Backup important files. Backups prevent data loss even if the phone becomes locked.

SquaredTech also suggests that users review installed apps from time to time. If an app looks unfamiliar, it should be removed. Routine checks can prevent long term infections.

Stay Updated: Tech News

Wasiq Tariq
Wasiq Tariq
Wasiq Tariq, a passionate tech enthusiast and avid gamer, immerses himself in the world of technology. With a vast collection of gadgets at his disposal, he explores the latest innovations and shares his insights with the world, driven by a mission to democratize knowledge and empower others in their technological endeavors.
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular