Keyword: androidos_usbattack.a
99565 Total Search   |   Showing Results : 101 - 120
This malicious app received widespread media attention in Japan. It steals affected users' contacts information and sends the stolen data to a server. To get a one-glance comprehensive view of the
This backdoor may be manually installed by a user. Arrival Details This backdoor may be manually installed by a user. NOTES: This malware may arrive via Trojanized Apps. It arrives via a modified
This Android malware acts as an SMS relay. It uses the infected device as proxy for sending and receiving SMS messages. As a result, affected users may be charged for sending SMS without their
This malware is said to be related to the crimeware SpyEye. It drops intercepted SMS to command and control servers that are related to SpyEye. To get a one-glance comprehensive view of the behavior
This malware poses as a security app or battery app. However, it steals email addresses from the user's contact list, which may be used for malicious purposes such as spamming. To get a one-glance
mobile devices compromised. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This malware leverages the TOR network to connect with a remote
This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3840. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat
This potentially unwanted application may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It may be downloaded from app stores/third
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Infection
This malware gathers sensitive information about the affected phone and sends the stolen data to a malicious URL. This spyware may be unknowingly downloaded by a user while visiting malicious
This malware contains a malicious library file that when executed, turns the infected device into a zombie device. It also hides its routines in the dynamic library, which makes it hard to analyze.
This Android malware poses as the Farm Frenzy game to lure users into downloading its copy on their Android-based phones. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This Android malware is said to record actual phone conversations. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This Android
a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This malware arrives on a system as a file dropped by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware can be downloaded from fake site that imitates Google Play, formerly known as the Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
This backdoor may be manually installed by a user. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a