Offshore Outsourcing & Scammer

Blog about offshore outsourcing and scammer in the outsourcing industry

Android Ransomware - Porn Droid

AndroidAs of late, zscaler ran over another variation of Porn Droid - an Android ransomware variation guaranteeing to be from the FBI, which blames individuals for watching youngster porn and after that requests a fine of USD 500.

It at first seems to the client as though they are downloading an obscene feature, yet once the client taps on the document, it takes on the appearance of the Google patch overhaul and traps the client into introducing the application.

Screenshot Update Patch Installation
It looks like a patch application

In the wake of clicking "Continue", the malware requests head access to the gadget asking for consents, for example, "Erase all data", "Set storage encryption", "Change the screen-unlock password" as demonstrated in screenshot beneath.

Screenshot: Activate Device Administrator - Porn Droid
Admin access

Once the client taps on the "ACTIVATE" button, the malware gets head control of the gadget and locks it while showing a fake FBI cautioning as seen underneath. It bolts the client's telephone by incapacitating keyguard and sets top need for the malware application which guarantees that no other application or client action can override the malware application's movement.

Screenshot: FBI device lock
FBI warning message

Screenshot: FBI Paypal payment
Payment tab

The FBI cautioning screen additionally contains dynamic data significant to the tainted gadget, for example, the program history, IMEI number, telephone number and casualty's photo, which has been taken by the malignant application. This is done to threaten the end client as a notice message proposes that the data will be utilized by the FBI to recognize the client if the fine is not paid.

Screenshot: FBI with user information
Screen with user information

Detailed analysis: zscaler ThreatLab

 

Comments are closed