Classification

Type :

Other

Platform :

Android

Aliases :

Android

Summary

'Android' is the platform designator used by F-Secure to identify programs that run on the Android operating system developed by Google.

Removal

When detected during scanning, F-Secure SAFE will prompt you for a desired action. You may assess the detected file and choose to Uninstall, Quarantine or keep it installed on your device. More information about these options can be found at User Guides: Assess files detected during scanning.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

'Android' is the platform designator used by F-Secure to identify programs that run on the Android operating system developed by Google.

Developed for use on mobile devices such as smartphones and tablets, the Android operating system has rapidly developed into the most popular platform for these consumer items.

Predictably, this has also sparked the rapid development of malware on the platform, including:

The majority of Android malware requires a user to actively install and launch an app in order to be affected. In such cases, attackers typically create an app that looks enticing or legitimate, but silently performs malicious actions in the background. Quite often, the app may be a legitimate app that has been hijacked and alter for malicious use (in which case, the app is said to be trojanized).

In some cases, the malicious app may exploit a vulnerability in the Android operating system in order to perform its malicious actions.