Keyword: androidos_usbattack.a
98882 Total Search   |   Showing Results : 21 - 40
This Android OS backdoor has the increased potential for damage, propagation, or both, that it possesses. Specifically, it is a Trojanized version of the official Android Market Security Tool for
This Trojan targets the Android platform and lures users into downloading apps from a fake Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This is a DroidDreamLight variant. The DroidDreamLight family is known to show notifications as part of its social engineering routine. This is to trick the user into clicking on the notifications to
This malicious application GingerBreak targets the Android platform and exploits a vulnerability presented on Android OS version 2.3 (code name: Gingerbread). After the exploit, the device is "rooted
This Trojan has a certain service which enables itself to automatically start at boot. It connects to a remote site to get premium-rate numbers where it will send a message to. The IMSI and location
This is an AndroidOS malware with backdoor capabilities. It drops a file that creates an IRC connection where it receives commands, thus compromising the affected system's security for the user. It
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: It is a hacking tool used for rooting mobile devices running on
This malware arrives as a Trojanized application named Jimm Application (an instant messaging client for ICQ network). It sends SMS messages to premium-rate numbers thus the user is billed for these
This hacking tool arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user.
This Android malware may be downloaded in Google Play assuming several app names. It checks if an SMS message is sent from a number listed in a reference text file. If the number is included in the
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It uses common file icons to trick a user into thinking that the files are legitimate. Arrival Details This
This Android backdoor can be controlled via SMS or phone calls. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This application is
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
The malware exploits the Android Master Key vulnerability to install a backdoor. This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user.
This malware is a variant of a VMAP, a mobile component of targeted attacks which affected various sectors in the Middle East. It is capable of searching and extracting information from affected
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
This Trojan appeared on the Google Play app market. Once this Trojan is installed on the affected device and the application is used, it creates a shortcut that looks like it is the game, Legend of
This is the first mobile ransomware that uses Tor, a legitimate service that allows for concealed server connections. Users with mobile devices affected by this malware may find the files stored in
This adware is embedded in an application that unlocks levels of the popular game "Angry Birds." Upon execution the adware will run in the background as a service with the name AndroidMDKProvider. It