Keyword: androidos_usbattack.a
99493 Total Search   |   Showing Results : 221 - 240
This malware arrives when users accessed a compromised website. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Once installed, it
This Android malware is able to evade Google’s Bouncer. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan sends out text
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: This malware is part of a tool used for rooting Android devices.
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: After installation, it displays an icon named Penetrate Pro .
spotted a fake news application that has capability to circumvent the filtering of Google Play. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown
This malware uses common file icons to trick a user into thinking that the files are legitimate. Mobile Malware Routine This malware displays the following: 有什么不懂加qq:390870570 Once the app is used,
This hacking tool may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This hacking tool may be unknowingly downloaded by a
This malware is installed as com.android.providers.downloadsmanager . It silently executes when the affected device is booted or when it receives or makes a call. It then gathers certain information
PLANKTON is a family of malware that has backdoor capabilities. It runs on Android operating systems, arriving as repackaged normal Android apps. Apart from its backdoor capabilities, it steals
This adware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This adware may be unknowingly downloaded by a user
NOTES: This adware can make clicks automatically in the background. Once the adware running on the device, it can do any of the following. Establish a connection with the C&C server silently. C&C
Rapid spreading Miner botnet This Coinminer arrives as a component bundled with malware/grayware packages. It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU)
This Virus may be manually installed by a user. Arrival Details This Virus may be manually installed by a user. Mobile Malware Routine This Virus acts as an SMS relay which receives SMS to be
NOTES: The app generally disguises as games and themes coming from mobile markets including Google Play. It will build a network tunnel in the background service if it is able to receive a command
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be manually installed by a user. It may be downloaded from app stores/third party app stores. Arrival
apps are only downloaded via HTTP and not HTTPS. As a result, a second attacker capable of carrying out man-in-the-middle attacks could change the downloaded apps, in effect overriding the payload of the
NOTES: Based on analysis of the codes, this Android malware has the following capabilities: Loads a local html page in 1 pixel iframe. The said html tries to open the following malicious URLs: www.
This is the Trend Micro detection for mobile apps that are able to exploit a vulnerability in certain Android operating systems. When exploited, the said vulnerability can allow malicious users to
This Adware drops and runs other files on the device. It displays pop-up advertisements. Mobile Malware Routine This Adware is a file that collects the following information on an affected mobile
After being launched, it checks the root status of device first. If the device is not rooted, a notification of current root status and a button named “一键获取Root权限”(get the root privilege) appears on the