Code tree structure:
3. Operating Mechanism of malicious components:
After Reverse Analysis of the virus sample code, the operating principle of the virus has basically surfaced, registering Android components for malware and calling relationships between them.
The following are key malicious code:
(1) Automated On-Demand paid videos.
(2) automatically
shared between multiple//activities, you must is careful about when you read or write//it in order to keep from stepping on yourself.Sharedpreferences preferences = Getsharedpreferences ("Redirectdata", 0); Mtextpref= Preferences.getstring ("text",NULL); if(Mtextpref! =NULL) {TextView text=(TextView) Findviewbyid (R.id.text); Text.settext (MTEXTPREF); return true; } return false; }Other uses are startactivityforresult. This example does not have any new knowledge, but involves
In Android application debugging, sometimes the log output of a third-party application is output by a standard function such as printf, Logcat cannot capture these logs, and one method is to use the Logwrapper command to execute a third-party application. The Logwrapper command redirects the standard output of a third-party application to the Logcat log system (the default level is Log_info, and the label is the application name).The usage of Logwrap
With the rapid arrival of the 3G era, the mobile business era with mobile phones as the carrier is about to begin. Mobile phones are gradually evolving from voice and information communication terminals to personal information business terminals. Therefore, mobile phones play an increasingly important role in people's daily lives, at the same time, many potential threats also emerge. In recent years, with the rapid development of the mobile communication industry, "
The most important part of a antivirus software package is the virus database and the virus engine. The virus database is obtained from the server. the antivirus engine is used to determine whether the package name and signature in the program match the package name and signature in the virus database, if the match is
There used to be a female graduate student who clicked on a phishing link. Then the real-time anti-virus screen, followed by the results of anti-virus, ran out of more than 10 viruses, recorded the specific location of the infected computer, and prompted her to update antivirus software, and she paid 2000 yuan after receiving "antivirus software." As a result, instead of anti-
The world's first new Android Trojan Golem virus infected tens of thousands of mobile phones
When the mobile phone is recharged on the desk, the screen is suddenly highlighted. When no one is touched, a mobile phone game runs, slides, and executes many commands. After the execution, the phone quietly closes the screen display, and nothing happens. The mobile phone owner will find that his cell phone battery
Jinshan mobile Phone Poison PA released today's Android mobile phone security report, daily monitoring of 15,000 Android devices are infected with the virus. The first is the cottage phone, parallel imports of mobile phones and third-party ROM packets of mobile phones, virus detection rate continues to increase, has be
Talk about the recently popular android mobile phone virus
"XXX (host name): ht: // ********** XXshenqi.apk" is a recent mobile phone virus outbreak. The host receives such a text message, it starts with the name stored in the sender's mobile phone address book and then allows the recipient to open a webpage link.
Actually, a friend familiar with
startup greatly reduce the startup speed,
In addition, You Cannot uninstall the system software. This situation cannot be attributed to malware,
Of course, you can't just lick your face and say it's for the sake of users.
As a result, some rogue software is quietly connected to the Internet in the background, and a large number of users complain that their mobile phones will inevitably increase a large amount of Internet fees.
However, system applications Cannot uninstall these software, result
In contrast to Android, the outlook is good, but it seems to me that the market is a bit messy. Applications that are good, almost, or even self-interested are all mixed in the Android app market, recently, I saw on the Internet Lenovo app security detection and research team expose the virus code analysis for the two Android
a conclusion at the beginning: the numerous domesticAndroid advertising allianceSDKAlready virus-infected,Push AdvertisementAnd collect the user's mobile phone number, wireless network card, and geographical location information.Personal privacy, AndMobile phone traffic and powerResulting in sustained consumption. Literacy: What is an advertisement SDK? The so-called advertisement SDK is familiar to Android
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.