Keyword: androidos_usbattack.a
99488 Total Search   |   Showing Results : 101 - 120
This rogue app pretends to be an Android version of the popular iOS game, Temple Run. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below.
This malware is used to leverage one-click billing fraud attacks targeted at Android users. Said attacks could result in loss of funds on the users' part. To get a one-glance comprehensive view of
This malicious app received widespread media attention in Japan. It steals affected users' contacts information and sends the stolen data to a server. To get a one-glance comprehensive view of the
This Trojan is an Android application that may be downloaded manually from third party Android markets. It is a modified version of the application Walk and Text . It gathers specific information
It attempts to send text messages to premium numbers 7132 and 4161 that contain specific strings. As a result, affected users may be charged according to the respective number's rate. Based on the
mobile devices compromised. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This malware leverages the TOR network to connect with a remote
This potentially unwanted application may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It may be downloaded from app stores/third
This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3840. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This malware contains a malicious library file that when executed, turns the infected device into a zombie device. It also hides its routines in the dynamic library, which makes it hard to analyze.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This malware arrives on a system as a file dropped by other
This Android malware is said to record actual phone conversations. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This Android
This Android malware poses as the Farm Frenzy game to lure users into downloading its copy on their Android-based phones. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This malware can be downloaded from fake site that imitates Google Play, formerly known as the Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Android malware arrives as a fan-made application that tricks users into thinking that it is the same as the original. It displays advertisements upon installation. To get a one-glance
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Infection
This backdoor may be manually installed by a user. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the
This malware gathers sensitive information about the affected phone and sends the stolen data to a malicious URL. This spyware may be unknowingly downloaded by a user while visiting malicious