Keyword: androidos_tcent.a
99370 Total Search   |   Showing Results : 21 - 40
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
related to the menu of fast food chain KFC. The app name is wow@25 . This app contains a Windows worm named StreamingAssets.exe . The app developer's computer may have been infected by a Windows worm. The
NOTES: This backdoor arrives through Trojanized Android apps which require root privilege. Below is a screenshot of an infected app: It requests permissions outside the intended functionality of the
Other Details This Trojan Spy does the following: Disguised as "KDDI Security," a security application, it presents itself as a security tool while engaging in data collection. The application
Other Details This Trojan Spy does the following: Get and Replace Default SMS Package Send SMS Protect Source Code Obfuscate Package Name Application is also signed by a Debug Certificate Mobile
as a fake security app with the label KDDI Security. It monitors and collect sensitive information. Trojan-Spy.AndroidOS.Agent (IKARUS), UDS:Trojan.AndroidOS.Boogr.gsh (KASPERSKY) Downloaded from the
Installation This Exploit takes advantage of the following vulnerability/vulnerabilities to elevate privileges: CVE-2015-1538: Integer overflow in libstagefright parsing crafted MP4 video
This spyware targets mobile banking users by posing as a fake token generator. During execution it asks for the user's password and generates a fake token while sending the user's information to a
The number of infected phones by this malware increases rapidly. Hence, the cybercriminal responsible is able to generate a large amount of revenue given that the current infection rates are
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It uses a file name that tricks a user into thinking that it contains
This Android OS backdoor has the increased potential for damage, propagation, or both, that it possesses. Specifically, it is a Trojanized version of the official Android Market Security Tool for
This Trojan targets the Android platform and lures users into downloading apps from a fake Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This malicious application GingerBreak targets the Android platform and exploits a vulnerability presented on Android OS version 2.3 (code name: Gingerbread). After the exploit, the device is "rooted
This Trojan has a certain service which enables itself to automatically start at boot. It connects to a remote site to get premium-rate numbers where it will send a message to. The IMSI and location
This is a DroidDreamLight variant. The DroidDreamLight family is known to show notifications as part of its social engineering routine. This is to trick the user into clicking on the notifications to
This is an AndroidOS malware with backdoor capabilities. It drops a file that creates an IRC connection where it receives commands, thus compromising the affected system's security for the user. It
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: It is a hacking tool used for rooting mobile devices running on
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It uses common file icons to trick a user into thinking that the files are legitimate. Arrival Details This
This malware arrives as a Trojanized application named Jimm Application (an instant messaging client for ICQ network). It sends SMS messages to premium-rate numbers thus the user is billed for these
This hacking tool arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user.