Trojan (Android)





Trojan:Android/[family], Trojan.Android.[family]


An application (app) that secretly performs other actions that affect personal or confidential information stored on the device, and/or control of the device.

Automatic action

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

Suspect a file is incorrectly detected (a False Positive)?

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest detection database updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    NOTE If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note You need administrative rights to change the settings.

For more Support


Find the latest advice in our Community.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Trojans that run on the Android operating system are usually either specially-crafted programs that are designed to look like desirable software (e.g., games, system updates or utilities), or copies of legitimate programs that have been repackaged or trojanized to include harmful components.


Trojans rely on tricking the user into believing that the program is authentic, so that they unwittingly install the program themselves. Trojans on the Android platform are often distributed using the same (or very similar) names and designs as popular programs found in online app marketplaces, to increase the chances that users will mistake the trojan for the legitimate app and install it instead.


Once the trojan is installed on the device, it silently performs its actual, unauthorized functions, which may range from harvesting personal data from the device, to sending premium SMS messages or intercepting SMS messages, connecting the device to a botnet and so on.

Examples of trojans on the Android platform include:


For more information about malware on the Android platform, see the latest Mobile Threat Reports.