Keyword: androidos_usbattack.a
99494 Total Search   |   Showing Results : 281 - 300
NOTES: This app includes an aggressive 3rd party SDK. The SDK gets user's personal information, such as location information and history bookmark, without user's awareness or authorization. It sends
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This Trojan bears the file icons of certain applications to avoid easy detection and consequent removal. Installation This Trojan bears the file icons of the following applications: HGS Mobile
Mobile Malware Routine This Trojan bears the file icons of the following applications: AhnLab V3 Mobile Plus 2.0 It also steals the following information from the affected device: IMEI Phone Number
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
NOTES: This malicious app sends text messages without informing the user. In some samples, the message content may contain private information.
This Potentially Unwanted Application sends SMS messages to premium numbers, resulting in unwanted charges billed to you. Mobile Malware Routine This Potentially Unwanted Application sends text
This Trojan steals certain information from the system and/or the user. It sends SMS messages to premium numbers, resulting in unwanted charges billed to you. Information Theft This Trojan steals the
This Trojan is able to lock and wipe data in infected devices. It uses SMS message to receive the command.
This Android malware contains an ad fraud SDK. The creator developed this malware to mimic actual user behavior. It can create bot ad traffic and blend bot traffic with existing human traffic. The
This adware may be downloaded from app stores/third party app stores. Arrival Details This adware may be downloaded from app stores/third party app stores. NOTES: This malware is capable of: leaking
This backdoor gathers device information. It monitors all incoming and outgoing calls. Mobile Malware Routine This backdoor gathers the following device information: imei Wi-Fi MAC address cellphone
This is the Trend Micro detection for mobile vulnerabilities found in Android applications. Android OS defines the data storage zone for private or public access. This detection shows that sensitive
This Trojan also has rootkit capabilities, which enables it to hide its processes and files from the user. It steals email account information. Rootkit Capabilities This Trojan also has rootkit
Mobile Malware Routine This spyware collects the following device information: SMS message history, location and subscriber information
disguised as a program that will let them view adult videos onto their systems. Instead of letting them watch videos, they are persistently bombarded by alerts asking them to pay for a certain registration
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/124201161225.jpeg In a rather unexpected turn of events, cybercriminals recently went out of their way to make a statement against piracy. While this
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,