The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
A family of malicious programs for Android mobile devices. They can be distributed via legitimate applications and games modified by cybercriminals. These malicious programs can monitor incoming text messages and outgoing phone calls and save all collected data into a special file that can be forwarded to cybercriminals later. Moreover, the malware can upload information on phone number and IMEI to a remote server.
In addition to that, these Trojans can execute various commands received from the remote server. For example, they can send text messages, make phone calls, and install other applications.
Android.GoldDream.1
Android.GoldDream.8
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.