malwarebytes banner

Smartphone malware

Tutorials and virus removal guides, that will help you get rid of malware, that infects iOS and Android systems of your smartphones. Simple instructions and the best antivirus software for mobile devices.

android infected with Malicious RedAlert - Rocket Alerts App

How to remove Malicious RedAlert – Rocket Alerts App (Android)

Malicious RedAlert - Rocket Alerts App is a deceptive Android application that masquerades as the legitimate RedAlert - Rocket Alerts app by Elad Nava, designed to provide accurate airstrike alerts. This malicious software operates as spyware, collecting sensitive data like call logs, contacts, SMS messages, and device information. It utilizes anti-analysis mechanisms to evade detection and is believed to be linked to pro-Palestinian hacktivist groups, particularly in the context of the 2023 Israel–Hamas war. The app requests numerous permissions that it exploits for harmful activities, such as accessing and stealing personal information. It can lead to severe privacy breaches, financial losses, and identity theft. The fake app often infiltrates devices through typosquatting and deceptive websites, closely resembling the legitimate application's official page. Users are advised to download applications only from verified sources and to use reputable antivirus software to protect their devices.
android infected with Rusty Droid RAT

How to remove Rusty Droid RAT (Android)

Rusty Droid RAT is a sophisticated piece of malware targeting Android devices, designed to give cybercriminals unauthorized remote access and control. This Remote Access Trojan can perform a multitude of malicious activities, including keylogging, stealing sensitive information, and intercepting communications. It can also read SMS messages and push notifications, send spam, and even initiate calls to premium-rate numbers, causing financial losses. Rusty Droid can escalate its privileges to gain administrative control, allowing it to lock the screen, mute the device, and manipulate app data. It poses a severe threat to user privacy and security, capable of stealing cryptocurrency wallet seed phrases and other financial information. Infected devices often exhibit symptoms such as slowed performance, increased battery drain, and unexpected changes to system settings. Users need to exercise caution by downloading apps only from trusted sources and employing robust mobile security solutions to mitigate the risk from such formidable threats.
android infected with DragonEgg malware

How to remove DragonEgg malware (Android)

DragonEgg malware is an advanced spyware-type threat targeting Android devices, primarily associated with the Chinese state-backed cyber-espionage group APT41. This malicious software masquerades as legitimate applications, such as third-party keyboards and messengers, to infiltrate devices undetected. Once installed, DragonEgg requests extensive permissions and downloads additional modules from its Command and Control (C&C) server to conduct its surveillance activities. The malware's capabilities include exfiltrating files, recording audio, taking photos stealthily, and collecting communication data such as contact lists and SMS messages. This spyware poses severe risks, including privacy breaches, financial losses, and identity theft. Known for targeting both public and private sectors globally, DragonEgg's impact can be especially devastating when leveraged against highly sensitive targets. Its ability to evade detection and its customizable nature make it a persistent threat in the cybersecurity landscape.
android infected with VajraSpy RAT

How to remove VajraSpy RAT (Android)

VajraSpy RAT is a sophisticated remote access trojan specifically designed to target Android devices for espionage purposes. This malware is capable of a wide range of malicious activities, including data theft, call recording, message interception, and even capturing photos through the device's camera. It typically infiltrates devices through seemingly innocuous apps that users download from trusted sources like Google Play or through third-party platforms. Once installed, it operates covertly, extracting sensitive information such as contacts, SMS messages, call logs, and device location. Some versions of VajraSpy extend their reach by exploiting accessibility options to intercept communications from popular messaging apps like WhatsApp and Signal. This makes it exceptionally dangerous as it can lead to unauthorized surveillance and misuse of personal data. The consequences of an infection can be severe, including privacy breaches, identity theft, financial loss, and exposure to further malicious activities. Therefore, it is crucial for users to exercise caution when downloading apps and to maintain robust security measures on their devices.
android infected with Aesimus malware

How to remove Aesimus malware (Android)

Aesimus malware is a sophisticated form of Android malware that primarily targets mobile users through seemingly legitimate creativity applications. This Trojan variant is a derivative of the notorious Autolycos malware and operates by subscribing victims to premium services without their consent, leading to significant financial losses. Once installed, Aesimus leverages a native library to conceal its presence, evading detection by checking for rooted devices and reverse engineering tools. It typically infiltrates devices via deceptive Google Ads campaigns that promote fraudulent apps like Pixel Brush and Oil Watercolor Painting. These apps climb the Google Play Store rankings through manipulated reviews and downloads, increasing their reach. Infected devices exhibit symptoms such as slow performance, unexplained data usage, and the presence of unauthorized applications. Users are advised to employ robust security measures, including reliable antivirus software and vigilance when downloading apps, to mitigate the risk of infection.
android infected with SoumniBot malware

How to remove SoumniBot malware (Android)

SoumniBot malware is a sophisticated Android-specific Trojan designed to exfiltrate sensitive data, with a particular focus on banking-related information. This malicious software employs advanced anti-detection techniques, including obfuscation of its Android manifest, incorrect validation of the compression method field, and manipulation of manifest size. These methods allow it to bypass standard security measures and install itself on devices. Once installed, SoumniBot establishes a connection with its Command and Control (C&C) server, gathering a wide array of information such as IP addresses, geolocation data, installed applications, and even digital certificates from Korean banks. The malware can also exfiltrate SMS and MMS messages, adding and removing contacts, and potentially function as toll fraud malware. The presence of SoumniBot on a device poses severe privacy risks, financial losses, and potential identity theft. Its developers are continually improving its capabilities, making it a persistent and evolving threat.
android infected with XploitSPY

How to remove XploitSPY (Android)

XploitSPY is a sophisticated piece of Android-specific malware based on the L3MON Remote Access Trojan (RAT). This malicious software is designed with extensive data-stealing capabilities, enabling it to infiltrate devices by masquerading as legitimate applications. Once installed, XploitSPY can access and exfiltrate a variety of sensitive data, including installed applications, files, geolocation data, and information from messaging apps like WhatsApp and Telegram. It intercepts notifications, gathers contact lists, call logs, and SMS messages, and can even send SMS messages, potentially leading to toll fraud. Moreover, it exhibits spyware characteristics by taking photos with the device's camera and recording audio through its microphone. XploitSPY is particularly insidious due to its well-obfuscated code and anti-analysis mechanisms, which make it difficult to detect and analyze. The malware's distribution methods are diverse, often piggybacking on seemingly innocent apps distributed through deceptive websites, GitHub, and even the Google Play Store. The presence of XploitSPY poses severe risks, including privacy breaches, financial losses, and identity theft, making it essential to remove the malware promptly upon detection.
android infected with Greenbean Banking Trojan

How to remove Greenbean Banking Trojan (Android)

Greenbean Banking Trojan is a sophisticated malware targeting Android devices, specifically designed to steal banking and finance-related information. This malicious software leverages Android Accessibility Services to gain extensive control over infected devices, allowing it to read the screen, simulate touch inputs, and even lock or unlock the device. Upon infiltration, Greenbean prompts users to grant it Accessibility permissions, which it then exploits to escalate its privileges and gather sensitive data such as device information, network details, installed applications, contact lists, and SMS data. The trojan can also download files, extract clipboard content, send SMS messages, and take screenshots. Notably, Greenbean has the novel ability to stream the infected device's screen and camera view in real-time. Targeting applications like Gmail, WeChat, AliPay, MyVIB, MetaMask, and Paybis, this malware aims to capture login credentials, personally identifiable information, and financial data, potentially leading to severe privacy issues, financial losses, and identity theft. Distribution methods include infected email attachments, malicious advertisements, deceptive applications, and scam websites, making it imperative for users to exercise caution and maintain updated security measures on their devices.