About: Dendroid (malware)     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : owl:Thing, within Data Space : dbpedia.demo.openlinksw.com associated with source document(s)
QRcode icon
http://dbpedia.demo.openlinksw.com/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FDendroid_%28malware%29&invfp=IFP_OFF&sas=SAME_AS_OFF

Dendroid is malware that affects Android OS and targets the mobile platform. It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300.Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time.When first discovered in 2014 it was one of the most sophisticated Android remote administration tools known at that time.It was one of the first Trojan applications to get past Google's Bouncer and caused researchers to warn about it being easier to create Android malware due to it.It also seems to have followed in the footsteps of Zeus and SpyEye by having simple-to-use command and control panels.The code appeared to be leaked somewhere around 2014.It was noted that an apk binder was included in the lea

AttributesValues
rdfs:label
  • Dendroid (es)
  • Dendroid (malware) (en)
rdfs:comment
  • Dendroid is malware that affects Android OS and targets the mobile platform. It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300.Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time.When first discovered in 2014 it was one of the most sophisticated Android remote administration tools known at that time.It was one of the first Trojan applications to get past Google's Bouncer and caused researchers to warn about it being easier to create Android malware due to it.It also seems to have followed in the footsteps of Zeus and SpyEye by having simple-to-use command and control panels.The code appeared to be leaked somewhere around 2014.It was noted that an apk binder was included in the lea (en)
  • Dendroid es un malware que afecta al sistema operativo Android y apunta a la plataforma móvil.Fue descubierto por primera vez a principios de 2014 por Symantec y apareció en el metro a la venta por 300 dólares. Hay algunas cosas que se observaron en Dendroid, tales como ser capaz de esconderse de los emuladores en el momento. Cuando se descubrió por primera vez en 2014, fue una de las más sofisticadas herramientas de Android para la administración remota conocidas en ese momento. Fue una de las primeras aplicaciones de Troya para superar el Bouncer de Google y causó que los investigadores advirtieran sobre la posibilidad de crear malware para Android debido a ello. También parece tener un seguimiento de los pasos de Zeus y SpyEye, por tener paneles de mando y control fáciles de usar. El có (es)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • Dendroid is malware that affects Android OS and targets the mobile platform. It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300.Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time.When first discovered in 2014 it was one of the most sophisticated Android remote administration tools known at that time.It was one of the first Trojan applications to get past Google's Bouncer and caused researchers to warn about it being easier to create Android malware due to it.It also seems to have followed in the footsteps of Zeus and SpyEye by having simple-to-use command and control panels.The code appeared to be leaked somewhere around 2014.It was noted that an apk binder was included in the leak, which provided a simple way to bind Dendroid to legitimate applications. It is capable of: * Deleting call logs * Opening web pages * Dialing any number * Recording calls * SMS intercepting * Uploading images and video * Opening an application * Performing denial-of-service attacks * Changing the command and control server (en)
  • Dendroid es un malware que afecta al sistema operativo Android y apunta a la plataforma móvil.Fue descubierto por primera vez a principios de 2014 por Symantec y apareció en el metro a la venta por 300 dólares. Hay algunas cosas que se observaron en Dendroid, tales como ser capaz de esconderse de los emuladores en el momento. Cuando se descubrió por primera vez en 2014, fue una de las más sofisticadas herramientas de Android para la administración remota conocidas en ese momento. Fue una de las primeras aplicaciones de Troya para superar el Bouncer de Google y causó que los investigadores advirtieran sobre la posibilidad de crear malware para Android debido a ello. También parece tener un seguimiento de los pasos de Zeus y SpyEye, por tener paneles de mando y control fáciles de usar. El código parecía estar filtrado en algún lugar alrededor de 2014. Se observó que se incluyó un aglutinante de apk en la fuga, que proporcionó una manera sencilla de unir Dendroid a aplicaciones legítimas.Es capaz de: * Eliminar registros de llamadas * Apertura de páginas web * Marcar cualquier número * Grabar llamadas * Interceptación de SMS * Carga de imágenes y de vídeo * Abrir una aplicación * Realizar ataques de denegación de servicio * Cambiar el servidor de comando y control * Fue desarrollado por un usuario anónimo, basándose en hash del bitcoin. (es)
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
is Wikipage redirect of
is Wikipage disambiguates of
is foaf:primaryTopic of
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 63 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software