Keyword: androidos_tcent.a
99645 Total Search   |   Showing Results : 141 - 160
This mobile malware presents itself as a fake copy of certain game apps. It displays advertisements. It can also navigate the app store to install other unrelated apps. Mobile Malware Routine Upon
This Android malware installs itself as an administrator and uses a vulnerability found in Android. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
downloaded by a user while visiting malicious websites. It bears the file icons of certain applications to avoid easy detection and consequent removal. Arrival Details This Trojan may be unknowingly downloaded
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it disguises itself as a media player application
This malware has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This is the malware associated with the fake WhatsApp notification. Once users click on the Play button in the said email, they are lead to a multi-platform malware that can execute on Windows, iOS,
file icons to trick a user into thinking that the files are legitimate. It sends stolen data to certain websites. Mobile Malware Routine This backdoor poses as an Android application that uses random
This adware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It may be downloaded from app stores/third party app stores. It saves
server: 'news' - pushes remote advertising information to the notification bar 'showpage' - opens a webpage received from the remote server 'install' - silently downloads malware disguised as an app into
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It may be downloaded from app stores/third party app stores. Arrival
}cnew.net/install3_traf.php NOTES: When user installs this app, it hides as a background service. It automatically verifies a user's SMS message by sending and receiving a verify code from these numbers: 5013 5014 1161 1121
This mobile malware is capable of sending premium-rate SMS to a number of countries, ensuring its wide reach. This mobile malware uses an adult-related name to trick users into downloading it on
remote servers and installing any applications to the Android devices without user's authorization. When a user launches the application, Moplus SDK automatically sets up a local HTTP server on the device
This app pretends to be related to Euro 2012. It listens to messages from Android C2DM server and sends out certain text messages according the C2DM message. C2DM is a message pushing architecture
This malware gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting bookmarks, setting browser homepage, and getting
This Trojan may be manually installed by a user. It steals certain information from the system and/or the user. Arrival Details This Trojan may be manually installed by a user. Information Theft This
This hacking tool may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This hacking tool may be unknowingly downloaded by
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It may be downloaded from app stores/third party app stores. Arrival Details This backdoor may be unknowingly
It forwards all incoming SMS messages received on the phone to a C&C number. This may result in a breach of privacy for the user, and may cause their personal information and/or
This malware steals the user's contact list on the affected device. The information includes phone numbers and names. The stolen information is uploaded into a remote database. This Trojan may be