Keyword: androidos_usbattack.a
99370 Total Search   |   Showing Results : 81 - 100
This Trojan is disguised as a downloader of popular Android applications. It is a premium service abuser that targets users with Android-based devices in several countries such as Russia and Germany.
It pretends to be a legitimate game app. It acquires a Javascript Objection Notation from a site and installs shortcuts on the affected device. Should the created shortcut be clicked, a download page
This adware connects to a certain URL in order to send information and receive commands. This may result in the phone's security being compromised. To get a one-glance comprehensive view of the
conceals itself as a legitimate wallpaper. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Based on its behavior, the purpose of this Trojan is
This Android malware leads users to a fake adult dating website. Once users click on the websites' links, which purportedly lead to dating profiles and contact details, they are instead given
This Trojan has a certain service which enables itself to automatically start at boot. It connects to a remote site to get premium-rate numbers where it will send a message to. The IMSI and location
This malware is noteworthy as it is an Android malware that specifically targets China Mobile subscribers. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
This Android malware is able to evade Google’s Bouncer. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan poses as an app
device. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This malware gathers specific information from the infected device. It connects to a
This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it disguises as a
This application is installed manually by a user on a target device. The application will then secretly monitor the device's GPS location, SMS, emails, and calls. It also gives the remote user the
Trend Micro has flagged this Android OS backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This malware poses as a security app or battery app. However, it steals email addresses from the user's contact list, which may be used for malicious purposes such as spamming. To get a one-glance
This rogue app pretends to be an Android version of the popular iOS game, Temple Run. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below.
This malware is used to leverage one-click billing fraud attacks targeted at Android users. Said attacks could result in loss of funds on the users' part. To get a one-glance comprehensive view of
This application steals information and may be used to track the device's location without the knowledge of the user. This spyware may be manually installed by a user. Arrival Details This spyware
This malicious app received widespread media attention in Japan. It steals affected users' contacts information and sends the stolen data to a server. To get a one-glance comprehensive view of the
This malware is said to be related to the crimeware SpyEye. It drops intercepted SMS to command and control servers that are related to SpyEye. To get a one-glance comprehensive view of the behavior
This backdoor may be manually installed by a user. Arrival Details This backdoor may be manually installed by a user. NOTES: This malware may arrive via Trojanized Apps. It arrives via a modified