Trojan:Android/Plankton variants silently forward information about the device to a remote location. In addition, they download an additional file onto the device.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Once installed on a device, Trojan:Android/Plankton will forward the following details (about the Plankton app itself) to a remote server:
On receiving this information, the server contacted returns a URL, from which Plankton retrieves a JAR file.
In addition to collecting the details for the Plankton app, the trojan will also collect the following information:
These details are also forwarded to the remote server.
Plankton variants are also able to perform the following actions on the device, among others: