Keyword: androidos_usbattack.a
99494 Total Search   |   Showing Results : 241 - 260
advertisements it displays per day. NOTES: The app pretends to be Angry Birds and leads users to downloading and installing other applications. . Once user launch this app, a dialog pops and tells user to fill a
This spyware monitors all incoming and outgoing calls. It uses common file icons to trick a user into thinking that the files are legitimate. Mobile Malware Routine This spyware is a file that
crash via an attack. Here’s an example of a fatal bug: if the code uses getExtra(), getBundleExtra(), getCharExtra(), etc. to get an incoming intent’s parameter, one must check whether the return value is
their signature. This would allow an attacker to remotely gain access to the affected device. NOTES: A malware can abuse this vulnerability in two ways. 1. It can be used to hide a payload. Malware may
following C&C server(s): bweri6.]cc Based on analysis of the codes, it has the following capabilities: Record screen Set volmue of phone ring Send sms Display a dialog mimic the given bank UI Launch a
This hacking tool is used to root Android devices. Rooting enables the users to have elevated rights and permissions to access Android 's software. This hacking tool may be manually installed by a
This Android malware collects certain device information. This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user. NOTES: This Android malware
premium SMS without the affected mobile user's knowledge. As a result, the user is charged or billed a premium rate. Via app stores Sends SMS to premium service
Information Theft Upon execution of the affected application, it gathers the following information: Fine Location Phone Number Text messages Contact list NOTES: This is a generic detection for
detection for Android applications bundled with malicious code. It is capable of doing the following: download unwanted apps push adult ads register as device admin NOTES: The app installs itself as a call
as recording data, stealing information, sending information to C&C servers, and a self-destruct mechanism to cover its tracks. NOTES: This malware purports itself as a normal communication app in
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It uses a convincing Graphical User Interface to make the users think that the software
NOTES: It accesses use's private information such as phone number, device’s unique identification number, and text message among others. It then sends the information through text message.
Adware Routine This adware connects to the following URLs to download and display ads: http://ads.{BLOCKED}p.com/in_game_api/ads/register_click http://ads.{BLOCKED
other malware on the affected computer. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Rootkit Capabilities This Trojan
This backdoor gathers device information. Mobile Malware Routine This backdoor is a file that collects the following information on an affected mobile device: SMS messages Location Browser history
This Trojan guesses the password of TP-LINK router's administrator account. If it succeeds, it simulates the browser's behavior to change the router's DNS to its rogue server . Because normally Wi-Fi
NOTES: This malware is a Potentially-Unwanted Application (PUA) live show payware app with multiple pay SDKS, such as Alipay, Iapppay and Unionpay. Iappay is a payment service SDK that allows for
This XLoader variant poses as a security app for Android devices, and uses a malicious iOS profile to affect iPhone and iPad devices. Downloaded from the Internet Connects to URLs/IPs
Mobile Malware Routine This Spyware acts as an SMS relay which receives SMS to be forwarded from a remote URL. As a result, affected users may be charged for sending SMS without their knowledge