From 90e3602db64156efdb47347a9ceff4d1a985806e Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Wed, 9 Jan 2019 15:33:34 +0100 Subject: [PATCH] add AndroidOS_HidenAd --- clusters/android.json | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/clusters/android.json b/clusters/android.json index dc9db6c..c3d7797 100644 --- a/clusters/android.json +++ b/clusters/android.json @@ -4629,6 +4629,16 @@ }, "uuid": "08965226-c8a9-11e8-ad82-b3fe44882268", "value": "Triout" + }, + { + "description": "active adware family (detected by Trend Micro as AndroidOS_HidenAd) disguised as 85 game, TV, and remote control simulator apps on the Google Play store", + "meta": { + "refs": [ + "https://blog.trendmicro.com/trendlabs-security-intelligence/adware-disguised-as-game-tv-remote-control-apps-infect-9-million-google-play-users/" + ] + }, + "uuid": "64ee0ae8-2e78-43bf-b81b-e7e5c2e30cd0", + "value": "AndroidOS_HidenAd" } ], "version": 17