Search
Keyword: androidos_usbattack.a
This adware is found in application stores. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below. This adware displays unsolicited
system. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This malware works alongside GPS Spy. It disguises as an Android game application. A
This Trojan is disguised as a downloader of popular Android applications. It is a premium service abuser that targets users with Android-based devices in several countries such as Russia and Germany.
It pretends to be a legitimate game app. It acquires a Javascript Objection Notation from a site and installs shortcuts on the affected device. Should the created shortcut be clicked, a download page
This adware connects to a certain URL in order to send information and receive commands. This may result in the phone's security being compromised. To get a one-glance comprehensive view of the
conceals itself as a legitimate wallpaper. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Based on its behavior, the purpose of this Trojan is
This Android malware leads users to a fake adult dating website. Once users click on the websites' links, which purportedly lead to dating profiles and contact details, they are instead given
This Trojan has a certain service which enables itself to automatically start at boot. It connects to a remote site to get premium-rate numbers where it will send a message to. The IMSI and location
This malware is noteworthy as it is an Android malware that specifically targets China Mobile subscribers. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
This Android malware is able to evade Google’s Bouncer. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan poses as an app
device. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This malware gathers specific information from the infected device. It connects to a
This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it disguises as a
This application is installed manually by a user on a target device. The application will then secretly monitor the device's GPS location, SMS, emails, and calls. It also gives the remote user the
Trend Micro has flagged this Android OS backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This malware poses as a security app or battery app. However, it steals email addresses from the user's contact list, which may be used for malicious purposes such as spamming. To get a one-glance
This rogue app pretends to be an Android version of the popular iOS game, Temple Run. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below.
This malware is used to leverage one-click billing fraud attacks targeted at Android users. Said attacks could result in loss of funds on the users' part. To get a one-glance comprehensive view of
This application steals information and may be used to track the device's location without the knowledge of the user. This spyware may be manually installed by a user. Arrival Details This spyware
This malicious app received widespread media attention in Japan. It steals affected users' contacts information and sends the stolen data to a server. To get a one-glance comprehensive view of the