Architectures are becoming more and more complexto keep up with the increase of algorithmic complexity. Tofully exploit those architectures, dynamic resources managersare required. The goal of dynamic managers is either to optimizethe resource usage (e.g. cores, memory) or to reduceenergy consumption under performances constraints. However,performance optimization being their main goal, they are notdeveloped to be secure and present vulnerabilities. Recently, itwas proven that energy managers can be exploited to cause faultswithin a processor and it can be used to steal information froma user device. However, this exploitation is not often possiblein current commercial devices. In this work, we show currentsecurity vulnerabilities through another type of malicious usageof energy management, experimentation shows that it is possibleto remotely lock out a device, denying access to all services anddata, requiring for example the user to pay a ransom to unlockit. The main target of this exploit are embedded systems and wedemonstrate this work by its implementation on two differentcommercial ARM based devices.