Simple Ransomware in Android with Flask and KivyMD

Listen to this Post

📌 How Does It Work?

1. Server (Flask – Key) 🔑

  • Generates and manages the encryption key.
  • Handles requests from the infected application.
  • Can receive commands to encrypt or decrypt files.

2. Android Application (KivyMD – Encryptor) 📱

  • Explores and selects files from the device.
  • Encrypts files with a key only known by the server.
  • Displays a ransom message to recover files.

🚨 Security Reflection

This demonstration highlights the importance of protecting devices against malware. Best practices include:

✅ Avoid downloading apps from unofficial stores.

✅ Review app permissions before granting access.

✅ Maintain regular backups of critical data.

✅ Use security solutions to detect suspicious behavior.

You Should Know:

1. Analyzing Ransomware Behavior in Linux

Use these commands to detect ransomware-like activity:

 Monitor file changes in real-time 
inotifywait -m -r /home/user/documents

Check suspicious processes 
ps aux | grep -E '(encrypt|ransom|kivy|flask)'

List recently modified files 
find / -type f -mtime -1 -exec ls -lh {} \; 

2. Detecting Malicious Flask Servers

If a suspicious Flask server is running:

 List running Python processes 
pgrep -a python

Check network connections 
netstat -tulnp | grep flask

Kill the malicious process 
sudo kill -9 <PID> 

3. Securing Android Devices

Use ADB to analyze suspicious apps:

 List installed apps 
adb shell pm list packages

Extract APK of a suspicious app 
adb shell pm path com.suspicious.app 
adb pull /path/to/apk

Analyze APK with MobSF 
mobsf /path/to/app.apk 

4. Ransomware Prevention in Windows

Use PowerShell to enforce security:

 Enable Controlled Folder Access (Windows Defender) 
Set-MpPreference -EnableControlledFolderAccess Enabled

Monitor file encryption attempts 
Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4656} 

What Undercode Say:

Understanding ransomware mechanics is crucial for cybersecurity professionals. This proof-of-concept demonstrates how easily attackers can exploit weak app permissions and unsecured devices. Always enforce strict security policies, monitor file integrity, and educate users on phishing and malicious apps.

For further reading:

Expected Output:

A detailed analysis of ransomware behavior, detection methods, and mitigation strategies for both Android and Linux/Windows systems.

References:

Reported By: Luis Angel – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image