Skip to content

10 results in Threat Encyclopedia: “ANDROIDOS_PLANKTON”
Showing Results : 1 - 10
     
...title, icon and text Trojan:AndroidOS/Plankton.gen!A (Microsoft...A (Fsecure), Trojan.AndroidOS.Plankton.h (Sunbelt), Andr.Plangton-12...Android (Fortinet), Trojan.AndroidOS.Plankton (Ikarus), Android/Plankton...
...title, icon and text Trojan:AndroidOS/Plankton.gen!A (Microsoft...A (Fsecure), Trojan.AndroidOS.Plankton.h (Sunbelt), Android...tr (Fortinet), Trojan.AndroidOS.Plankton (Ikarus), Android/Plankton...
...Counterclank.A (Fsecure), Andr.Plangton-12 (Clamav), Android/Plankton.A!tr (Fortinet), Trojan.AndroidOS.Plankton (Ikarus), Android/Plankton.A trojan (Eset), Downloaded from the Internet, Via app stores Compromises...
...icon and text Andr/NewyearL-B (Sophos), Application:Android/Counterclank.A (Fsecure), Trojan.AndroidOS.Plankton.h (Sunbelt), Andr.Plangton-12 (Clamav), Android/Plankton.A!tr (Fortinet), Android/Plankton...
...notification link, title, icon and text Trojan:AndroidOS/Plankton.gen!A (Microsoft), Android.Counterclank...CounterClank!Android (Fortinet), Trojan.AndroidOS.Plankton (Ikarus), Android/Plankton.G trojan (Eset...
This malware gathers various information on the affected device. It may connect to a C&C server to send information gathered.
PLANKTON is a family of malware that has backdoor capabilities. It runs on Android operating systems, arriving as repackaged normal Android apps.
This malicious app is known as Brightest Flashlight Free.It gathers various information on the affected device. It may connect to a C&C server to send information gathered.
This adware connects to a certain URL in order to send information and receive commands. This may result in the phone's security being compromised.To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below.
This is related to ANDROIDOS_PLANKTON.A. The malware connects to this URL in order to listen for commands.

Connect with us on