Hack-tool:Android!Online

Classification

Riskware

Hack-tool

Android

Hack-tool:Android/Doods.[variant]!Online , Hack-tool:Android/Dsploit.[variant]!Online, Hack-tool:Android/Faceniff.[variant]!Online , Hack-tool:Android/Luckypatcher.[variant]!Online , Hack-tool:Android/Metasploit.[variant]!Online

Summary

A utility program used to gain more access to an operating system or program than is usually permitted.

Removal

Automatic action

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

About Security Cloud

F-Secure's Security Cloud is an online service that tracks the security reputation of common programs, files and websites. If a questionable program or file is found during a scan, your F-Secure security product will send a query to the Security Cloud to get its most recent reputation rating. The product will then use that information (and if needed, further analysis) to choose whether to block, quarantine or remove the program or file.

The Security Cloud rating for the identified app indicates that it is a hack-tool, or a utility program used to bypass security mechanisms such as access restrictions, copyright protection and so on. Some hack-tools (also known as software crackers or patchers) are used to modify programs to disable certain features.

While hack-tools and similar apps may be legitimately used by the device's authorized user, they are classified by security programs as riskware because in the hands of unauthorized users, they can also be used to cause damage to the user's data or the device. The legality of using a hack-tool can also vary widely depending on the laws of the country and specific details of how it is used.

If you are confident that you are aware of the risks involved in using the app and consent to its use, you may choose to keep the app installed on your device.

Date Created: -

Date Last Modified: -