Keyword: androidos_usbattack.a
99565 Total Search   |   Showing Results : 81 - 100
This adware is found in application stores. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below. This adware displays unsolicited
system. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This malware works alongside GPS Spy. It disguises as an Android game application. A
This Trojan is disguised as a downloader of popular Android applications. It is a premium service abuser that targets users with Android-based devices in several countries such as Russia and Germany.
conceals itself as a legitimate wallpaper. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Based on its behavior, the purpose of this Trojan is
This adware connects to a certain URL in order to send information and receive commands. This may result in the phone's security being compromised. To get a one-glance comprehensive view of the
It pretends to be a legitimate game app. It acquires a Javascript Objection Notation from a site and installs shortcuts on the affected device. Should the created shortcut be clicked, a download page
This Android malware leads users to a fake adult dating website. Once users click on the websites' links, which purportedly lead to dating profiles and contact details, they are instead given
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This application is installed manually by a user on a target device. The application will then secretly monitor the device's GPS location, SMS, emails, and calls. It also gives the remote user the
Trend Micro has flagged this Android OS backdoor as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the
This malware is noteworthy as it is an Android malware that specifically targets China Mobile subscribers. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
This Trojan has a certain service which enables itself to automatically start at boot. It connects to a remote site to get premium-rate numbers where it will send a message to. The IMSI and location
device. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This malware gathers specific information from the infected device. It connects to a
This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it disguises as a
This Android malware is able to evade Google’s Bouncer. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan poses as an app
This malware is used to leverage one-click billing fraud attacks targeted at Android users. Said attacks could result in loss of funds on the users' part. To get a one-glance comprehensive view of
This rogue app pretends to be an Android version of the popular iOS game, Temple Run. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below.
This Trojan is an Android application that may be downloaded manually from third party Android markets. It is a modified version of the application Walk and Text . It gathers specific information
It attempts to send text messages to premium numbers 7132 and 4161 that contain specific strings. As a result, affected users may be charged according to the respective number's rate. Based on the
This application steals information and may be used to track the device's location without the knowledge of the user. This spyware may be manually installed by a user. Arrival Details This spyware