All Attacks Exploit kits Malware Mobile Other Detections

SMS Trojan

These Trojans use the SMS (text) messaging services of a mobile device to send and intercept messages. The user is usually unaware of the behavior.


Mobile spyware

Mobile spyware hides in the background (no shortcut icon is created) on a mobile device and steals information such as incoming/outgoing SMS messages, incoming/outgoing call logs, contact lists, emails, browser history, and photos. They can also potentially record inputted keystrokes, record anything within the distance of the device’s microphone, secretly take pictures in the background, and track the device’s location using GPS. In some cases, spyware apps can even control devices via commands sent by SMS messages and/or remote servers. Stolen information can be sent via data transfer to a remote server or through email.


Mobile PUP

PUPs use the mobile platform and trusting nature of users to install an app which might have cool functionality but comes bundled with unwanted features such as draining the battery, leaking data, and aggressive advertising. These apps aren’t necessarily malicious but users might want to reconsider installing due to performance hits or bad reputation.


Mobile ransomware

Mobile ransomware uses scare tactics to pressure victims into paying fees to unlock their mobile device and restore lost data.


Mobile Bank Trojan

With mobile devices and SMS messaging becoming more mainstream, banks looked to capitalize and offer customers a way to access accounts and authentication transactions.


Select your language