New Android Malware ‘DroidLock’ Can Hijack Phones in Real TimeHackers exploit newly patched Fortinet auth bypass flaws

📌 What DroidLock Is

DroidLock is a newly identified type of Android malware that behaves like ransomware but is even more dangerous because it gives attackers near-total control over infected phones. Rather than encrypting files like traditional ransomware, DroidLock aggressively abuses Android system permissions and overlays to lock the device and extort victims.


🛠️ How DroidLock Infects Devices

  • The malware is spread through phishing websites and fake download pages that mimic legitimate apps or update screens.
  • Users are tricked into installing a “dropper” app that loads the real malware in a second stage.
  • During installation, DroidLock requests Device Administrator and Accessibility Service permissions — these are powerful privileges meant for system utilities, screen readers, etc. When granted, they give the malware extensive control over the device.

😨 Capabilities of DroidLock

Once active, DroidLock can:
Lock the device screen with full-screen overlays that block access
Change device PIN, password, or biometric credentials, preventing the owner from unlocking their phone.
Display bogus ransom messages demanding payment within a short deadline (e.g., 24 hours) or threaten data destruction.
Wipe all data remotely (factory reset).
Remotely control the phone, including capturing screenshots, muting audio, triggering the camera, and interacting with apps through overlays.
Harvest sensitive information such as SMS messages, call logs, contacts, and audio recordings.
Establish real-time communication with a command-and-control server to receive instructions.

Unlike typical ransomware that encrypts files, DroidLock intimidates and coerces victims by locking them out and threatening data loss if a ransom isn’t paid — but the malware can still wipe data if commanded.


🌍 Current Campaign & Targeting

  • The initial campaign observed by researchers has primarily targeted Spanish-speaking users, though the malware’s design could easily be adapted to other regions or languages.

🧠 Why This Is Especially Dangerous

  • Accessibility and Device Admin abuse gives DroidLock the ability to take actions that most malware cannot — such as changing lock credentials and controlling the UI.
  • The use of live remote control channels (e.g., VNC-style remote commands) allows attackers to interact with devices as if they were physically holding them.
  • It combines aspects of traditional malware, ransomware, and remote access trojans (RATs) into a single, highly intrusive threat.

🛡️ How to Protect Yourself

To reduce your risk of DroidLock or similar threats:
🔹 Only install apps from the Google Play Store or other trusted official sources.
🔹 Be cautious with apps that request Accessibility Services or Device Admin permissions — most apps don’t need them unless they provide system-level assistance.
🔹 Enable and keep Google Play Protect and Android OS updates turned on.
🔹 Use reputable mobile security/antivirus apps that can detect and block known malware strains.
🔹 If you encounter a ransom screen, do not pay — instead disconnect from the network (airplane mode) and seek professional help.


🧠 Summary

DroidLock is not just ordinary ransomware — it is a highly invasive Android malware that can:

  • lock screens, change security settings, and block access
  • present ransom-style overlays
  • remotely control and interact with the device
  • wipe or destroy user data
  • harvest personal info and bypass normal protections

This combination of features makes DroidLock a significant new threat in mobile cybersecurity.

Ref : https://siliconangle.com/2025/12/10/new-droidlock-threat-gives-attackers-near-total-control-android-phones/

Related documents

Who to contact