Keyword: androidos_tcent.a
99897 Total Search   |   Showing Results : 21 - 40
This is the new variant of DroidDreamLight that exhibits information theft routines. It also guises itself as apps like battery-monitoring tool, a task-listing tool, and an app listing the
related to the menu of fast food chain KFC. The app name is wow@25 . This app contains a Windows worm named StreamingAssets.exe . The app developer's computer may have been infected by a Windows worm. The
Other Details This Potentially Unwanted Application does the following: The label "Stockspot" features an icon closely resembling that of the legitimate Stockspot application, yet it has a different
This Trojan monitors all incoming and outgoing calls. Mobile Malware Routine This Trojan is a file that collects the following information on an affected mobile device: Installed applications on the
NOTES: This backdoor arrives through Trojanized Android apps which require root privilege. Below is a screenshot of an infected app: It requests permissions outside the intended functionality of the
Other Details This Trojan Spy does the following: Disguised as "KDDI Security," a security application, it presents itself as a security tool while engaging in data collection. The application
Other Details This Trojan Spy does the following: Get and Replace Default SMS Package Send SMS Protect Source Code Obfuscate Package Name Application is also signed by a Debug Certificate Mobile
as a fake security app with the label KDDI Security. It monitors and collect sensitive information. Trojan-Spy.AndroidOS.Agent (IKARUS), UDS:Trojan.AndroidOS.Boogr.gsh (KASPERSKY) Downloaded from the
Installation This Exploit takes advantage of the following vulnerability/vulnerabilities to elevate privileges: CVE-2015-1538: Integer overflow in libstagefright parsing crafted MP4 video
This spyware targets mobile banking users by posing as a fake token generator. During execution it asks for the user's password and generates a fake token while sending the user's information to a
The number of infected phones by this malware increases rapidly. Hence, the cybercriminal responsible is able to generate a large amount of revenue given that the current infection rates are
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It uses a file name that tricks a user into thinking that it contains
This Android OS backdoor has the increased potential for damage, propagation, or both, that it possesses. Specifically, it is a Trojanized version of the official Android Market Security Tool for
This Trojan targets the Android platform and lures users into downloading apps from a fake Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This is a DroidDreamLight variant. The DroidDreamLight family is known to show notifications as part of its social engineering routine. This is to trick the user into clicking on the notifications to
This Trojan has a certain service which enables itself to automatically start at boot. It connects to a remote site to get premium-rate numbers where it will send a message to. The IMSI and location
This malicious application GingerBreak targets the Android platform and exploits a vulnerability presented on Android OS version 2.3 (code name: Gingerbread). After the exploit, the device is "rooted
This is an AndroidOS malware with backdoor capabilities. It drops a file that creates an IRC connection where it receives commands, thus compromising the affected system's security for the user. It
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: It is a hacking tool used for rooting mobile devices running on
This hacking tool arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user.