Skip to main content
Skip to main content
500 entries found. Displaying page 23 of 25.
Updated on Jun 05, 2012
Alert level: severe
Updated on Jul 02, 2012
Alert level: severe
Updated on Jul 02, 2012
Alert level: severe
Updated on Mar 24, 2015
Alert level: severe
Updated on Oct 26, 2015
Alert level: severe
Updated on Feb 25, 2016
Alert level: severe
Updated on Jun 23, 2016
Alert level: severe
Updated on Apr 27, 2017
Alert level: severe
Updated on Jun 23, 2017
Alert level: severe
Updated on Oct 17, 2017
Alert level: severe
Updated on May 03, 2018
Alert level: severe
Updated on Jun 23, 2018
Alert level: severe
Updated on Oct 29, 2019
Alert level: severe
Updated on Nov 07, 2019
Alert level: severe
Updated on Nov 11, 2019

The Trojan:AndroidOS/Androrat.A!MTB malware family demonstrates how open-source administrative tools can be repurposed into significant mobile security threats. Originating as a publicly available proof-of-concept for Android device control, its code has been adapted and expanded by various threat actors and state-sponsored groups. The malware operates by subverting the Android operating system's security model, primarily through the aggressive solicitation of permissions and the abuse of accessibility services to gain extensive control over target devices. Its evolution reflects a shift from simple information theft to functioning as a complex, multi-stage surveillance platform. The framework's core capability involves breaking device sandboxing to provide operators with remote access to sensitive data and hardware functions, including cameras, microphones, and private communications. 

Alert level: severe
Updated on Nov 11, 2019
Alert level: severe
Updated on Nov 12, 2019
Alert level: severe
Updated on Nov 21, 2019
Alert level: severe
Updated on Dec 08, 2019
Alert level: severe
Updated on Jan 13, 2020
Alert level: severe