Keyword: androidos_usbattack.a
99202 Total Search   |   Showing Results : 21 - 40
This spyware targets mobile banking users by posing as a fake token generator. During execution it asks for the user's password and generates a fake token while sending the user's information to a
The number of infected phones by this malware increases rapidly. Hence, the cybercriminal responsible is able to generate a large amount of revenue given that the current infection rates are
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It uses a file name that tricks a user into thinking that it contains
This Android OS backdoor has the increased potential for damage, propagation, or both, that it possesses. Specifically, it is a Trojanized version of the official Android Market Security Tool for
This Trojan targets the Android platform and lures users into downloading apps from a fake Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This is a DroidDreamLight variant. The DroidDreamLight family is known to show notifications as part of its social engineering routine. This is to trick the user into clicking on the notifications to
This Trojan has a certain service which enables itself to automatically start at boot. It connects to a remote site to get premium-rate numbers where it will send a message to. The IMSI and location
This malicious application GingerBreak targets the Android platform and exploits a vulnerability presented on Android OS version 2.3 (code name: Gingerbread). After the exploit, the device is "rooted
This is an AndroidOS malware with backdoor capabilities. It drops a file that creates an IRC connection where it receives commands, thus compromising the affected system's security for the user. It
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: It is a hacking tool used for rooting mobile devices running on
This hacking tool arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user.
This malware arrives as a Trojanized application named Jimm Application (an instant messaging client for ICQ network). It sends SMS messages to premium-rate numbers thus the user is billed for these
This Android malware may be downloaded in Google Play assuming several app names. It checks if an SMS message is sent from a number listed in a reference text file. If the number is included in the
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It uses common file icons to trick a user into thinking that the files are legitimate. Arrival Details This
This Android backdoor can be controlled via SMS or phone calls. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This application is
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
The malware exploits the Android Master Key vulnerability to install a backdoor. This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user.
This malware is a variant of a VMAP, a mobile component of targeted attacks which affected various sectors in the Middle East. It is capable of searching and extracting information from affected
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan appeared on the Google Play app market. Once this Trojan is installed on the affected device and the application is used, it creates a shortcut that looks like it is the game, Legend of