Keyword: androidos_usbattack.a2
100820 Total Search   |   Showing Results : 1 - 20
   Next  
This malware is a cross-platform threat, affecting both Android and Windows. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. NOTES:
programs we download onto our mobile devices. It's a shift in platform but with the same threat scenario. Users who download from app stores may end up downloading malware instead. Because of this, mobile
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/09720123053.png 2012 has been great year for the popular photo–sharing app Instagram . Its Android version has been a resounding success with 5M
This malicious application GingerBreak targets the Android platform and exploits a vulnerability presented on Android OS version 2.3 (code name: Gingerbread). After the exploit, the device is "rooted
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It uses a file name that tricks a user into thinking that it contains
This app pretends to be related to Euro 2012. It listens to messages from Android C2DM server and sends out certain text messages according the C2DM message. C2DM is a message pushing architecture
This malware is able to send an SMS to a Chinese premium number. As a result, affected users are charged without their knowledge. To get a one-glance comprehensive view of the behavior of this
This Android malware poses as the Farm Frenzy game to lure users into downloading its copy on their Android-based phones. To get a one-glance comprehensive view of the behavior of this Trojan, refer
to the following website(s) to download and execute a malicious file: http://{BLOCKED}e.net/?u=www.{BLOCKED}4free.ru%2Fgames%2Fextreme_formula%2FExtreme_Formula_v1.1.4.apk%3Fdl Via app stores,
NOTES: This backdoor arrives through Trojanized Android apps which require root privilege. Below is a screenshot of an infected app: It requests permissions outside the intended functionality of the
This adware connects to a certain URL in order to send information and receive commands. This may result in the phone's security being compromised. To get a one-glance comprehensive view of the
This is an AndroidOS malware with backdoor capabilities. It drops a file that creates an IRC connection where it receives commands, thus compromising the affected system's security for the user. It
. NOTES: This malware downloads and installs malicious apps from http://s.{BLOCKED}eonline.com/api/s2s/tracks/ . It attempts to establish a rootkit that includes the following privilege escalation
This adware is embedded in an application that unlocks levels of the popular game "Angry Birds." Upon execution the adware will run in the background as a service with the name AndroidMDKProvider. It
are the said remote commands: Creates an icon on home screen Pushes artibitary notification, which can potentially bring more threats on the affected device Opens a certain URL Sends SMS to received
NOTES: This malware is found repacked with a big number of apps from a third party app download website allegedly targeting Vietnamese users. It steals the following user information from the
Other Details This Trojan takes advantage of the following exploit(s): CVE-2015-1538 is the Stagefright library vulnerability which was reported at 2015-02-06. This is an integer overflow in the
This file contains a URL where it connects to possibly download other files. Other Details This Trojan drops the following file(s)/component(s): fdda100c6eb75ebe48fca33cfa3b01dc91506dfa
NOTES: This family is from a scam campaign named as Emmental. It spoofs many banks including ZKB, CreditSuisse, LUKB, BankAustria, Raiffeisen, and Sparkasse among others. Users are tricked into using