Keyword: androidos_usbattack.a
99488 Total Search   |   Showing Results : 141 - 160
This is the malware associated with the fake WhatsApp notification. Once users click on the Play button in the said email, they are lead to a multi-platform malware that can execute on Windows, iOS,
file icons to trick a user into thinking that the files are legitimate. It sends stolen data to certain websites. Mobile Malware Routine This backdoor poses as an Android application that uses random
This adware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It may be downloaded from app stores/third party app stores. It saves
server: 'news' - pushes remote advertising information to the notification bar 'showpage' - opens a webpage received from the remote server 'install' - silently downloads malware disguised as an app into
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It may be downloaded from app stores/third party app stores. Arrival
}cnew.net/install3_traf.php NOTES: When user installs this app, it hides as a background service. It automatically verifies a user's SMS message by sending and receiving a verify code from these numbers: 5013 5014 1161 1121
This mobile malware is capable of sending premium-rate SMS to a number of countries, ensuring its wide reach. This mobile malware uses an adult-related name to trick users into downloading it on
remote servers and installing any applications to the Android devices without user's authorization. When a user launches the application, Moplus SDK automatically sets up a local HTTP server on the device
This app pretends to be related to Euro 2012. It listens to messages from Android C2DM server and sends out certain text messages according the C2DM message. C2DM is a message pushing architecture
This malware gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting bookmarks, setting browser homepage, and getting
This Trojan may be manually installed by a user. It steals certain information from the system and/or the user. Arrival Details This Trojan may be manually installed by a user. Information Theft This
This hacking tool may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This hacking tool may be unknowingly downloaded by
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It may be downloaded from app stores/third party app stores. Arrival Details This backdoor may be unknowingly
It forwards all incoming SMS messages received on the phone to a C&C number. This may result in a breach of privacy for the user, and may cause their personal information and/or
This malware steals the user's contact list on the affected device. The information includes phone numbers and names. The stolen information is uploaded into a remote database. This Trojan may be
This malware fakes itself as a system service. It monitors user's contacts, location, SMS, and call records. NOTES: This malware fakes itself as a system service. It monitors user's contacts,
without the user's knowledge. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Arrival Details This Trojan arrives via SMS messages that
. NOTES: This malware downloads and installs malicious apps from http://s.{BLOCKED}eonline.com/api/s2s/tracks/ . It attempts to establish a rootkit that includes the following privilege escalation
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. NOTES:
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. NOTES: