The page may not load correctly.
An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.
Android.HiddenAds is the detection name for trojan programs that display intrusive ads. Members of this family are distributed under the guise of harmless apps so as not to make users suspicious. At the same time, in some cases, they can be installed in the system directory.
Android.HiddenAds adware trojans try to conceal their presence on infected devices. For example, they “hide” their icons from the home screen menu. Some variants of these trojans do not create any icons at all, or they replace them with other ones.
Android.HiddenAds.1925
Android.HiddenAds.1926
Android.HiddenAds.1927
Android.HiddenAds.1928
Android.HiddenAds.1929
Android.HiddenAds.1930
Android.HiddenAds.1931
Android.HiddenAds.1932
Android.HiddenAds.1933
Android.HiddenAds.1934
Android.HiddenAds.1935
Android.HiddenAds.1936
Android.HiddenAds.1937
Android.HiddenAds.1938
Android.HiddenAds.1939
Android.HiddenAds.1940
Android.HiddenAds.1941
Android.HiddenAds.1942
Android.HiddenAds.1943
Android.HiddenAds.1946
Android.HiddenAds.1947
Android.HiddenAds.1948
Android.HiddenAds.1949
Android.HiddenAds.1950
Android.HiddenAds.1951
Android.HiddenAds.1952
Android.HiddenAds.1953
Android.HiddenAds.1954
Android.HiddenAds.1955
Android.HiddenAds.1956
Android.HiddenAds.1957
Android.HiddenAds.1958
Android.HiddenAds.1960
Android.HiddenAds.1961
Android.HiddenAds.1962
Android.HiddenAds.1963
Android.HiddenAds.1964
Android.HiddenAds.1965
Android.HiddenAds.1966
Android.HiddenAds.1967
Android.HiddenAds.1968
Android.HiddenAds.1969
Android.HiddenAds.1970
Android.HiddenAds.1971
Android.HiddenAds.1972
Android.HiddenAds.1973
Android.HiddenAds.1974
Android.HiddenAds.1975
Android.HiddenAds.1976
Android.HiddenAds.1977
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51
According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.
Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.