- Jan 24, 2011
- 9,378
At the Security Analyst Summit (SAS 2016) held in Tenerife, Spain last week, Elena Kovakina, senior security analyst at Google said no Android users have been fooled into installing the Lockdroid ransomware, IT PRO reports.
Cyber-security firm Symantec detected a new variant of the Android.Lockdroid ransomware towards the end of January.
Lockdroid is using a complex clickjacking trick to infect devices
This particular version was abusing an older UI feature that allowed the malware's author to show a secondary overlay on top of the screen that required admin privileges for the app infected with the Lockdroid ransomware.
When users were pushing a button that read "Continue" (on the top-most overlay), they were unknowingly pushing the "Activate" button shown underneath, as part of an attack scenario known as clickjacking.
This issue affected two-thirds of the Android userbase, which is over a billion users. More precisely, the issue affected those users using versions of the Android operating system prior to 5.0 (Lollipop).
Read more: Google: Lockdroid Ransomware Failed to Infect Any Android Devices
Cyber-security firm Symantec detected a new variant of the Android.Lockdroid ransomware towards the end of January.
Lockdroid is using a complex clickjacking trick to infect devices
This particular version was abusing an older UI feature that allowed the malware's author to show a secondary overlay on top of the screen that required admin privileges for the app infected with the Lockdroid ransomware.
When users were pushing a button that read "Continue" (on the top-most overlay), they were unknowingly pushing the "Activate" button shown underneath, as part of an attack scenario known as clickjacking.
This issue affected two-thirds of the Android userbase, which is over a billion users. More precisely, the issue affected those users using versions of the Android operating system prior to 5.0 (Lollipop).
Read more: Google: Lockdroid Ransomware Failed to Infect Any Android Devices