Dubbed as "Android.Counterclank" by Symantec, is a bot-like threat that can receive commands to carry out certain actions, as well as steal information from the device. Android.Counterclank is a Trojan horse for Android devices that steals information and is available for download in the Android Market as an application package from the following publishers: iApps7 Inc.; Ogre Games and redmicapps.
SDK code connects with a remote server and sends confidential data, including private device information such as IMEI and more; gadget brand, manufacturer, model, and Android OS version; language preferences; browser user agent and more. When the information is delivered, the code waits for a command of interest, including: setting a browser homepage, creating requested bookmarks, creating shortcuts on the home screen and causes webpage activation.
The homepage; bookmarks, and shortcuts are sent to searchmobile.com which belongs to a third party, Infospace, providing monetary compensation to applications redirecting search queries through their website.
Suspicious applications from these publishers include:
Stripper Touch girl, Pretty women lingerie puzzle, Sexy Girls Photo Game, Sexy Girls Puzzle, Sexy Women Puzzle
Roleta je špeciálny inkognito mód, ktorým skryješ obsah obrazovky pred samým sebou, alebo inou osobou v tvojej izbe (napr. mama). Roletu odroluješ tak, že na ňu klikneš.
2 komenty
» android.blogvasion.com/2012/01/massive...
Dubbed as "Android.Counterclank" by Symantec, is a bot-like threat that can receive commands to carry out certain actions, as well as steal information from the device. Android.Counterclank is a Trojan horse for Android devices that steals information and is available for download in the Android Market as an application package from the following publishers: iApps7 Inc.; Ogre Games and redmicapps.
SDK code connects with a remote server and sends confidential data, including private device information such as IMEI and more; gadget brand, manufacturer, model, and Android OS version; language preferences; browser user agent and more. When the information is delivered, the code waits for a command of interest, including: setting a browser homepage, creating requested bookmarks, creating shortcuts on the home screen and causes webpage activation.
The homepage; bookmarks, and shortcuts are sent to searchmobile.com which belongs to a third party, Infospace, providing monetary compensation to applications redirecting search queries through their website.
Suspicious applications from these publishers include:
Stripper Touch girl, Pretty women lingerie puzzle, Sexy Girls Photo Game, Sexy Girls Puzzle, Sexy Women Puzzle
...že furt na to toľkí naletia