Keyword: androidos_usbattack.a
99488 Total Search   |   Showing Results : 201 - 220
shows a user interface about activation. After the user clicks on the supposed activation, it shows another interface indicating supposed activation: Based on its code, there are other features named
This is the Trend Micro detection for malware that sends sensitive information to remote servers. NOTES: This malware is an adware toolkit that sends sensitive information to a remote server.
NOTES: This family is from a scam campaign named as Emmental. It spoofs many banks including ZKB, CreditSuisse, LUKB, BankAustria, Raiffeisen, and Sparkasse among others. Users are tricked into using
NOTES: Once installed, this malware executes and sends the user's contact list and sends it to certain malicious sites. Analysis of its code reveals a malicious SDK file named zoo.tiger.sdk inserted
prevent uninstallation. It registers itself as a device administrator: It asks the user to give it device administrator privileges. With administrator privileges as well as the same icon and description as
NOTES: This application contains the vulnerable Moplus SDK from Baidu. The said SDK has the following routines similar to a backdoor: getting the location and package information pushing phishing
This Trojan forwards any received SMS to a specific number and sends SMS by keywords. It is controlled remotely via SMS to send SMS or write SMS to Inbox. It leverages a vulnerability in the China
This Spyware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It receives commands from a server that may be controlled by a bot or a
This Trojan may be manually installed by a user. It uses a file name similar to a legitimate file to pass as a legitimate file. It uses a convincing Graphical User Interface to make the users think
This malware masquerades as popular apps like MMS, whatsapp, and Pokemon Go. It is capable of hijacking a phone and is capable of many actions including calling a number or sending an SMS indicated
This file contains a URL where it connects to possibly download other files. Other Details This Trojan drops the following file(s)/component(s): fdda100c6eb75ebe48fca33cfa3b01dc91506dfa
This hacking tool is a component file that can be used to root Android devices. Rooting enables the user to have elevated rights and permissions to access Android's software. This hacking tool may
device. It displays pop-up advertisements. It uses common file icons to trick a user into thinking that the files are legitimate. This is the Trend Micro detection for Android applications bundled with
This is the Trend Micro detection for malicious apps that can be used to steal or intercept SMS messages from the affected device. NOTES: This malware may be downloaded and install by a user
This malicious app usually poses as a porn video player or system update to entice users to download and install on mobile devices. Once installed, it requests device admin privileges to prevent
gather certain information. It then sends these information to certain remote websites. This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed
This Trojan may be manually installed by a user. Arrival Details This Trojan may be downloaded from the following remote sites: {BLOCKED}giesthegame.ru {BLOCKED}giessymbian.ru {BLOCKED}giessamsung.ru
This malware poses as a free Flash player installer. It sends SMS based on different country code and operation code thus users are charged. This Trojan may be downloaded unknowingly by a user when
This is the Trend Micro detection for the SDK found in possibly thousands of apps once hosted in Google Play. Most of these apps have been since removed. To get a one-glance comprehensive view of the
This Backdoor drops and runs other files on the device. It uses common file icons to trick a user into thinking that the files are legitimate. Mobile Malware Routine This Backdoor is a file that