Keyword: androidos_usbattack.a22
100333 Total Search   |   Showing Results : 1 - 20
   Next  
This malware is a cross-platform threat, affecting both Android and Windows. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. NOTES:
Other Details This Trojan Spy does the following: Disguised as "KDDI Security," a security application, it presents itself as a security tool while engaging in data collection. The application
This is the first mobile ransomware that uses Tor, a legitimate service that allows for concealed server connections. Users with mobile devices affected by this malware may find the files stored in
are the said remote commands: Creates an icon on home screen Pushes artibitary notification, which can potentially bring more threats on the affected device Opens a certain URL Sends SMS to received
Other Details This Trojan takes advantage of the following exploit(s): CVE-2015-1538 is the Stagefright library vulnerability which was reported at 2015-02-06. This is an integer overflow in the
NOTES: This Android malware is a joke malware that locks user's device screen and restricts any kind of user activity. When the code is sold in underground forums, more than 1200 variants emerged.
This Trojan is disguised as a downloader of popular Android applications. It is a premium service abuser that targets users with Android-based devices in several countries such as Russia and Germany.
device. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This malware gathers specific information from the infected device. It connects to a
This Android malware leads users to a fake adult dating website. Once users click on the websites' links, which purportedly lead to dating profiles and contact details, they are instead given
Trend Micro has flagged this Android OS backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the
This Android malware is said to record actual phone conversations. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This Android
unrestricted access. It arrives with Trojanized applications. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. It steals information. It can also
downloaded by a user while visiting malicious websites. It bears the file icons of certain applications to avoid easy detection and consequent removal. Arrival Details This Trojan may be unknowingly downloaded
server: 'news' - pushes remote advertising information to the notification bar 'showpage' - opens a webpage received from the remote server 'install' - silently downloads malware disguised as an app into
. NOTES: This malware downloads and installs malicious apps from http://s.{BLOCKED}eonline.com/api/s2s/tracks/ . It attempts to establish a rootkit that includes the following privilege escalation
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. NOTES:
remote servers and installing any applications to the Android devices without user's authorization. When a user launches the application, Moplus SDK automatically sets up a local HTTP server on the device
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: After installation, it displays an icon named Penetrate Pro .
advertisements it displays per day. NOTES: The app pretends to be Angry Birds and leads users to downloading and installing other applications. . Once user launch this app, a dialog pops and tells user to fill a