Keyword: androidos_usbattack.a
95938 Total Search   |   Showing Results : 41 - 60
This adware is embedded in an application that unlocks levels of the popular game "Angry Birds." Upon execution the adware will run in the background as a service with the name AndroidMDKProvider. It
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
This malware is downloaded from a site that mimics Google Play . The app names it uses copy legitimate app names and uses legitimate apps' descriptions to further trick users into downloading and
This Trojan may be manually installed by a user. It may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be manually installed by a user. It may be downloaded
It forwards all incoming SMS messages received on the phone to a C&C number. This may result in a breach of privacy for the user, and may cause their personal information and/or correspondence to be
are the said remote commands: Creates an icon on home screen Pushes artibitary notification, which can potentially bring more threats on the affected device Opens a certain URL Sends SMS to received
This Android malware, known as DroidDreamLight, steals mobile-specific data. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is
infected device into dead rebooting loop. Cybercriminals can hide the exploit by creating a time triggered event. When the exploit runs, the system server crashes. It also stops all functionality of the said
This malware shows a fake infection on the affected user's mobile phone. Once the user clicks on the fake infection, it automatically downloads another app. The downloading uses network data and
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: It attempts to gather the following
This is the Trend Micro detection for the Superuser Android app, which manages what applications have access to the root user. This hacking tool may be manually installed by a user. Arrival Details
*** 93.95.219.*** 106.187.96.*** 124.217.245.*** 23.92.30.*** 82.146.58.*** 93.95.219.*** 209.59.205.*** It acts as an SMS relay which receives SMS to be forwarded from a remote URL. As a result, affected users
NOTES: This malware is found repacked with a big number of apps from a third party app download website allegedly targeting Vietnamese users. It steals the following user information from the
to the following website(s) to download and execute a malicious file: http://{BLOCKED}e.net/?u=www.{BLOCKED}4free.ru%2Fgames%2Fextreme_formula%2FExtreme_Formula_v1.1.4.apk%3Fdl Via app stores,
different contacts in the contact list of the affected mobile device. It uses the contact's saved name in the sent message as a greeting.
This mobile malware is capable of mining specific cryptocurrencies via mobile. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This
NOTES: This Android malware is a joke malware that locks user's device screen and restricts any kind of user activity. When the code is sold in underground forums, more than 1200 variants emerged.
This backdoor is a Trojanized copy of a legitimate gaming application for Android OS smartphones. It steals sensitive information of the affected phone's SMS and calls functions, compromising the
obtains data needed to execute its payload. It installs a receiver called SMSReceiver which is executed each time a text message is received. It gathers certain information from the affected device. It
This malware is a backdoor that is part of a remote administration tool used for malware distribution discovered in March 2014. It records and steals information from affected devices. Users with