Keyword: androidos_usbattack.a
99566 Total Search   |   Showing Results : 181 - 200
This is the Trend Micro detection for malicious apps that have information theft routines. This adware may be manually installed by a user. It may be downloaded from app stores/third party app
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: Once executed, this malicious app
android.permission.PROCESS_OUTGOING_CALLS intercept outgoing calls When the malware is executed, it configures the FTP server and the phone number. The phone number is a key in reopening the setting panel. By setting the phone number, the
NOTES: This malware is distributed via social networking sites that leveraged the Umbrella Revolution protesters in Hong Kong. When users unknowingly install and open it, the malware is hidden from
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: This is a PUA (potential unwanted
The first android application designed to attack NFC devices. This is sample aims to bypass and make users to have free rides in public transportation This malicious app is designed to attack
NOTES: This is the Trend Micro detection for 3rd-party apps infected with malicious code known as KSAPP. Once executed, the app may download possibly malicious files from the following URLs: http://
This mobile ransomware threatens to send personal data from a victim's phone to everyone in their contact list. It was carried by three apps found in Google Play: “Wallpapers Blur HD”, “Booster
A new variant of this mobile malware (ANDROIDOS_SLOCKER.OPST) is known to have the same GUI as WannaCry, and are capable of encrypting files. NOTES: This malware disguises itself as a system update.
This Trojan drops and runs other files on the device. This is the Trend Micro detection for Android applications bundled with malicious code. Mobile Malware Routine This Trojan is a file that
This malware leverages Moplus SDK to automatically and periodically deploy unwanted applications onto Android devices. Moplus SDK has been found out to include backdoor capabilities. To get a
information from the infected mobile device. Send the stolen information to a remote HTTP server. Mobile Malware Routine This Others is a file that collects the following information on an affected mobile
app on startup NOTES: Also known as Ghost Push , this malware are downloaded by unsuspecting users in third party app stores. The shell APK file decodes a DEX file in the assets folder. This file is
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. This
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user.
NOTES: These malicious applications use icons similar with some popular apps, such as Adobe Flash . Furthermore, these have names indicating that they are a downloader for popular applications. When
NOTES: The rooting tool TowelRoot is made by GeoHot that targets CVE-2014-3153 local privilege escalation vulnerability. It affects Linux Kernel 3.14.5 and consequently, most of Android versions. It
Mobile Malware Routine This Others collects the following device information: mac address imei iccid android id
NOTES: This malware connects to a remote server to download other malicious payloads to the device and installs them without the user's consent. Once the app is installed, the malicious code can be