Keyword: androidos_usbattack.a
99488 Total Search   |   Showing Results : 181 - 200
NOTES: This malicious app can be downloaded from third-party app stores. It tries to entice the user into installing the app by offering a fetish video. The malicious routines of the malware are
This is the Trend Micro detection for malicious apps that have information theft routines. This adware may be manually installed by a user. It may be downloaded from app stores/third party app
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: Once executed, this malicious app
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. This
NOTES: This malware is distributed via social networking sites that leveraged the Umbrella Revolution protesters in Hong Kong. When users unknowingly install and open it, the malware is hidden from
This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user.
The first android application designed to attack NFC devices. This is sample aims to bypass and make users to have free rides in public transportation This malicious app is designed to attack
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: This is a PUA (potential unwanted
NOTES: This is the Trend Micro detection for 3rd-party apps infected with malicious code known as KSAPP. Once executed, the app may download possibly malicious files from the following URLs: http://
A new variant of this mobile malware (ANDROIDOS_SLOCKER.OPST) is known to have the same GUI as WannaCry, and are capable of encrypting files. NOTES: This malware disguises itself as a system update.
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This Trojan drops and runs other files on the device. This is the Trend Micro detection for Android applications bundled with malicious code. Mobile Malware Routine This Trojan is a file that
This mobile ransomware threatens to send personal data from a victim's phone to everyone in their contact list. It was carried by three apps found in Google Play: “Wallpapers Blur HD”, “Booster
information from the infected mobile device. Send the stolen information to a remote HTTP server. Mobile Malware Routine This Others is a file that collects the following information on an affected mobile
app on startup NOTES: Also known as Ghost Push , this malware are downloaded by unsuspecting users in third party app stores. The shell APK file decodes a DEX file in the assets folder. This file is
NOTES: These malicious applications use icons similar with some popular apps, such as Adobe Flash . Furthermore, these have names indicating that they are a downloader for popular applications. When
NOTES: The rooting tool TowelRoot is made by GeoHot that targets CVE-2014-3153 local privilege escalation vulnerability. It affects Linux Kernel 3.14.5 and consequently, most of Android versions. It
This malware leverages Moplus SDK to automatically and periodically deploy unwanted applications onto Android devices. Moplus SDK has been found out to include backdoor capabilities. To get a
Mobile Malware Routine This Others collects the following device information: mac address imei iccid android id
NOTES: This malware connects to a remote server to download other malicious payloads to the device and installs them without the user's consent. Once the app is installed, the malicious code can be