Keyword: androidos_usbattack.a
99488 Total Search   |   Showing Results : 121 - 140
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Android malware masquerades as Adobe Flash Player with a legitimate-looking icon. It gathers the package names of installed applications including mobile banking apps and sends them to the
This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3839. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat
This is Trend Micro's detection for Android applications that have been trojanized to steal confidential information. It also connects to a remote server to send and receive commands. Once a command
This Android spyware records phone calls and answer calls automatically. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This Android
This backdoor may be manually installed by a user. It connects to a website to send and receive information. Arrival Details This backdoor may be manually installed by a user. Installation This
This Android malware is designed to steal users' SMS, contact list, call log, location information, and other phone informatio. It sends all gathered information to a remote server via an active
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It uses a file name that tricks a user into thinking that it contains adult-related
This malware imitates popular games for Android-based devices to redirect users to advertisement sites. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
unrestricted access. It arrives with Trojanized applications. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. It steals information. It can also
This Trojan dials a premium-rate number via an affected system's modem. The dialed number depends upon the user's location, which the user is asked to specify during the installation. As a result,
Users are lead to this malware via the following: via URL from email or SMS via download in app store such as Google Play When a user clicks on the URL from the email or SMS, it leads to vulnerabilities
Market and infected almost a hundred users before it was pulled out. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. The malware service
This adware may be manually installed by a user. It displays pop-up advertisements. Arrival Details This adware may be manually installed by a user. Adware Routine This adware displays pop-up
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It steals certain information from the system and/or the user. Arrival Details This Trojan may be unknowingly
This mobile malware presents itself as a fake copy of certain game apps. It displays advertisements. It can also navigate the app store to install other unrelated apps. Mobile Malware Routine Upon
This Android malware installs itself as an administrator and uses a vulnerability found in Android. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
downloaded by a user while visiting malicious websites. It bears the file icons of certain applications to avoid easy detection and consequent removal. Arrival Details This Trojan may be unknowingly downloaded
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it disguises itself as a media player application
This malware has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram