Keyword: androidos_tcent.a
99402 Total Search   |   Showing Results : 41 - 60
This hacking tool arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user.
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
This Android backdoor can be controlled via SMS or phone calls. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This application is
The malware exploits the Android Master Key vulnerability to install a backdoor. This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This malware is a variant of a VMAP, a mobile component of targeted attacks which affected various sectors in the Middle East. It is capable of searching and extracting information from affected
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
This Trojan appeared on the Google Play app market. Once this Trojan is installed on the affected device and the application is used, it creates a shortcut that looks like it is the game, Legend of
This is the first mobile ransomware that uses Tor, a legitimate service that allows for concealed server connections. Users with mobile devices affected by this malware may find the files stored in
This is the Trend Micro detection for malicious apps that steal information by redirecting incoming SMS messages received on the affected device to malicious users. NOTES: This malware poses as a
This adware is embedded in an application that unlocks levels of the popular game "Angry Birds." Upon execution the adware will run in the background as a service with the name AndroidMDKProvider. It
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
This malware is downloaded from a site that mimics Google Play . The app names it uses copy legitimate app names and uses legitimate apps' descriptions to further trick users into downloading and
This Trojan may be manually installed by a user. It may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be manually installed by a user. It may be downloaded
It forwards all incoming SMS messages received on the phone to a C&C number. This may result in a breach of privacy for the user, and may cause their personal information and/or correspondence to be
are the said remote commands: Creates an icon on home screen Pushes artibitary notification, which can potentially bring more threats on the affected device Opens a certain URL Sends SMS to received
This Android malware, known as DroidDreamLight, steals mobile-specific data. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is
infected device into dead rebooting loop. Cybercriminals can hide the exploit by creating a time triggered event. When the exploit runs, the system server crashes. It also stops all functionality of the said
Other Details This Trojan Spy does the following: Disguises itself as a fake "Anshin Security" application. Capable of collecting SMSs, contacts, account information, and a list of installed apps Has
This malware shows a fake infection on the affected user's mobile phone. Once the user clicks on the fake infection, it automatically downloads another app. The downloading uses network data and