Trustlook Research

See the latest antivirus research reports from Trustlook.

qvs_post_bg_2

Trustlook App Detects Qualcomm QuadRooter Vulnerability

Trustlook released a free Qualcomm QuadRooter Scanner application (available on Google Play) that enables Android phone owners to check if they are exposed to QuadRooter, the widespread vulnerability affecting millions of Android devices. If their device is exposed, the user may be able to download a software update from the device manufacturer that contains a security Read More

IMG_20160604_121345

Meet The Interns: Jin

Here at Trustlook, our team is small and close. We love working together and even more, we love to have fun together. Every Friday on the Trustlook blog, we will have features on our passionate team members. Our special summer edition will feature our newest interns! Each intern brings something special to the table and Read More

Trojan Attempts to Replace System Launcher and Collects Confidential Information

A malicious app was detected by Trustlook as “Android.Trojan.Ihide”, disguised itself as a system program and stole a  user’s information. The research Trojan package can be identified as having the following characteristics: MD5: A7C61401D00DD6398B549F4625BD58ED SHA256: 3AD322E600D72659C8F4182439C18DAAAEC2045716984B9D1F79FB1641773098 Size: 1090390 bytes App name: AndroidService Package name: com.android.adapi The package icon is: Upon the execution, the app opens Read More

13092077_10153674544756298_4256920524732634109_n (1)

Meet The Interns: Mike

Here at Trustlook, our team is small and close. We love working together and even more, we love to have fun together. Every Friday on the Trustlook blog, we will have features on our passionate team members. Our special summer edition will feature our newest interns! Each intern brings something special to the table and Read More

Trojan Disguised as Legitimate App to Steal Information

Trojans are pieces of software that appear as legitimate applications while exhibiting malicious behavior. A Trojan may steal information and cause the software system to become unreliable. The Research Trojan package, discovered and detected by Trustlook, can be identified as having the following characteristics: MD5: e62b8857bf396bff59e030c09e3a3fad SHA256: 0d225fbebcd18a398849b9bc8196838219545d356b26793ca25e89587c0b239e Size: 276394 bytes App name: Google Update Read More

Fake Adobe Flash App Evades Most Anti Virus Detection, Manipulates Phone by Command & Control Server in Latvia

— Trustlook Research Team Smartphones have been permeating into every corner of the world. After years of rapid growth, their popularity and usefulness reaches that of personal computers. Besides calling and texting, it is becoming more popular for people to do daily banking on their smartphone. With the computing capability, some traditional malware are shifting Read More

triada

Organized Crime using Rootkit – The analysis of the Triada malware

– Trustlook Research Team Trustlook Research Team recently researched a complicated malware which utilizes Rootkit SDK to facilitate malicious behaviors. MD5: 3B71DEBDE5F6A3E4D2E9321266DA76F7 Package name: fbkgofn.jpcebbe.mcdfpda.decjehi.kmnkgeg.kdgkohl The sample uses a popular root SDK (Root Genius, com.shuame.rootgenius.sdk) to root the user’s phone in order to get root privilege. It first checks if the phone has been rooted. Read More