Trojan (Android)

Classification

Category :

Malware

Type :

Trojan

Platform :

Android

Aliases :

Trojan:Android/[family], Trojan.Android.[family]

Summary

An application (app) that secretly performs other actions that affect personal or confidential information stored on the device, and/or control of the device.

Removal

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Trojans that run on the Android operating system are usually either specially-crafted programs that are designed to look like desirable software (e.g., games, system updates or utilities), or copies of legitimate programs that have been repackaged or trojanized to include harmful components.

Installation

Trojans rely on tricking the user into believing that the program is authentic, so that they unwittingly install the program themselves. Trojans on the Android platform are often distributed using the same (or very similar) names and designs as popular programs found in online app marketplaces, to increase the chances that users will mistake the trojan for the legitimate app and install it instead.

Impact

Once the trojan is installed on the device, it silently performs its actual, unauthorized functions, which may range from harvesting personal data from the device, to sending premium SMS messages or intercepting SMS messages, connecting the device to a botnet and so on.

Examples of trojans on the Android platform include:

More

For more information about malware on the Android platform, see the latest Mobile Threat Reports.