Keyword: androidos_usbattack.a
99565 Total Search   |   Showing Results : 161 - 180
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. NOTES:
This malware fakes itself as a system service. It monitors user's contacts, location, SMS, and call records. NOTES: This malware fakes itself as a system service. It monitors user's contacts,
NOTES: This malware pretends to the popular game NFS Hot Pursuit by using the same app name and icon. In reality, this malware is simply a downloader. Once installed, the malware will ask the user to
NOTES: When the user installs this malware, it creates an icon like Google Play. It contains the following malware APKs in its assets folder: 1.apk 2.apk 3.apk 4.apk 5.apk 6.apk 7.apk 8.apk Once
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
NOTES: This ransomware arrives via a malicious link in porn websites. After a user installs and opens it, it kills all apps except itself and system setting. It then displays a warning informing
NOTES: This malware exists in many tampered customized phone rom images as a backdoor open to cybercriminals. If users try to flash this kind of tampered image into the device, it puts their devices
To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This malware mines bitcoins via mobile devices. It imitates the app TuneIn Radio to
This spyware displays pop-up advertisements. It uses common file icons to trick a user into thinking that the files are legitimate. This is the Trend Micro detection for Android applications bundled
call records stored in the infected device. FakeSpy can also serve as a vector for a banking trojan. Once launched, FakeSpy will start monitoring for text messages that the affected device receives.
. However, as of this writing, the site is inaccessible. This malware disguises itself as a shortcut app named My HRMIS & JPA Demo . Once installed, it allows users to connect to the following URLs:
adware development kit. It pushes advertisements to the user in such a way that the user has no knowledge of which app the advertisement is coming from. It also steals information from the affected device,
This Trojan gathers device information. This is the Trend Micro detection for Android applications bundled with malicious code. Mobile Malware Routine This Trojan is a file that collects the
NOTES: This Android malware downloads malicious apps without the user's authorization. This routine may result in extra charges to the affected user. Upon analysis of this Trojanized app, a malicious
remote servers and installing any applications to the Android devices without user's authorization. When a user launches the application, Moplus SDK automatically sets up a local HTTP server on the device
remote servers and installing any applications to the Android devices without user’s authorization. When a user launches the application, Moplus SDK automatically sets up a local HTTP server on the device
remote servers and installing any applications to the Android devices without user's authorization. When a user launches the application, Moplus SDK automatically sets up a local HTTP server on the device
NOTES: This malware disguises itself as a bank dynamic token generator, which may fraud bank customers. It is running another background service that monitors user's incoming SMS. Every incoming SMS
NOTES: This malicious app can be downloaded from third-party app stores. It tries to entice the user into installing the app by offering a fetish video. The malicious routines of the malware are
This malware is a generic Android device root tool. Rooting allows users the ability to change system settings, run apps, and perform other privileges that are often inaccessible to normal users.