Skip to main content

Hackers Create Android Ransomware Easily Without Coding Using This App


Gone are the days when ill-famed hackers had to write their own scripts and run exploits to gain access to the computers. Today, there are tons of free and premium Trojan Development Kits (TDKs) that could be used to create malware without any prior knowledge of
programming or subtleties of hacking.
Recently, Symantec’s Dinesh Venkateshan spotted a specially crafted Android-based application that can be used to develop a functional Android ransomware. The whole process of creating the ransomware is automated with the help of a DAME (Device-Aided Malware Engineering) tool model.
This Android ransomware creation app is available on different hacking forums and Chinese social networking messaging service. The app is reported to be featuring an easy-to-use interface. Different functions available in the app are:
  • Icon to be used for malware
  • Key to be used to unlock the device
  • Message to be displayed on the locked screen of infected device
  • Custom operations to randomize the code
  • Animation to be shown on infected device
android ransomware kit dangerousWhile the app is free to download and take a look at its features, when the hacker will hit the “create” button, he/she will be asked to make a one-time payment. Once the subscription is complete, the hacker can create as many ransomware versions as they want.
According to the report, the ransomware created using this process mimics the Lockdroid behavior of locking the screen. The entire process is done on the smartphone without any need to write a single piece of code.
Symantec has also listed some security measures that one can take to defeat the ransomware attacks. These measures include — regular software updates, downloading apps only from Play Store, creating a backup of data, taking a look at the requested permissions, and installing a security app.

Comments

Follow Us

WHAT'S HOT

Virtual and Augmented Reality: Transforming The Way We Look At The Internet and Data Security

Virtual and Augmented Reality have redefined every aspect of our modern world ranging from gaming, music, and pop culture, to business, human interaction, and development. However, ‘with great power comes great responsibility’. When it comes to a technology slowly becoming a part of some of our most sensitive aspects in our lives (finances, identity, and health), ensuring its safety is highly important. Despite this, many companies have certainly not done their part to ensure the better virtual reality security and, in turn,

Twin sisters CONJOINED at abdomen, liver and umbilical cord die soon after birth (photo)

> The Siamese twins who were born in Zambia a few days ago passed away > They were joined at the chest > The babies shared one abdomen, liver and umbilical cord The conjoined twins who had been born at KITWE Central Hospital in Zambia a few days ago, have passed away. The Siamese girls were delivered by a 19-year-old woman. They were joined by the chest, sharing one abdomen, liver and umbilical cord.

Which Is The Best Linux Distro For Beginners? — 2017 Edition

Are you looking for  a Linux distro that’s suitable for new users who are willing to start   an exciting Linux journey? Well, you’re at the right place. These days, Linux Mint is giving a tough competition to Ubuntu as it’s very beginner-friendly. Our other top recommendations are Zorin OS (which looks a lot like Windows operating system) and lightweight Linux Lite.

Google’s Open Source DIY Kit Turns Your Raspberry Pi Into An AI Assistant

The latest edition of the MagPi magazine includes a DIY kit created by Google that can be used to create a custom Google Home device powered by Raspberry Pi. A user can take advantage of the Google Assistant SDK and Google Cloud Speech API to enable voice control in their projects.