Keyword: androidos_tcent.a
99454 Total Search   |   Showing Results : 81 - 100
This malware disguises itself as an app named Find and Call. It is a malicious app that uploads a user's phone book to a remote server and sends spammed SMS to the user's contact list. To get a
This malware arrives via a Trojanized Android game. It is installed together with a normal app called Steamy Window by Swiss code monkeys. It adds its malicious code as a service so that the user
This malware pretends to be either an Instagram or Angry Birds Space application for Android phones. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This application is installed manually by a user into a target device. The application then secretly forwards all its incoming SMS messages to another number. The application has no icon and no
This adware is found in application stores. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below. This adware displays unsolicited
system. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This malware works alongside GPS Spy. It disguises as an Android game application. A
This Trojan is disguised as a downloader of popular Android applications. It is a premium service abuser that targets users with Android-based devices in several countries such as Russia and Germany.
This adware connects to a certain URL in order to send information and receive commands. This may result in the phone's security being compromised. To get a one-glance comprehensive view of the
It pretends to be a legitimate game app. It acquires a Javascript Objection Notation from a site and installs shortcuts on the affected device. Should the created shortcut be clicked, a download page
conceals itself as a legitimate wallpaper. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Based on its behavior, the purpose of this Trojan is
device. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This malware gathers specific information from the infected device. It connects to a
This Android malware is able to evade Google’s Bouncer. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan poses as an app
This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it disguises as a
This Android malware leads users to a fake adult dating website. Once users click on the websites' links, which purportedly lead to dating profiles and contact details, they are instead given
This Trojan has a certain service which enables itself to automatically start at boot. It connects to a remote site to get premium-rate numbers where it will send a message to. The IMSI and location
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This application is installed manually by a user on a target device. The application will then secretly monitor the device's GPS location, SMS, emails, and calls. It also gives the remote user the
Trend Micro has flagged this Android OS backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the
This malware is a cross-platform threat, affecting both Android and Windows. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. NOTES:
This backdoor may be manually installed by a user. Arrival Details This backdoor may be manually installed by a user. NOTES: This malware may arrive via Trojanized Apps. It arrives via a modified