Latest Replies


Latest Threads


How to Remove AdSMS (Android Trojan) [ Removal / Uninstall Guide ]

Discussion in 'Malware Removal Guides' started by Jack, Aug 10, 2011.

  1. Jack

    Jack Administrator
    Staff Member

    Jan 24, 2011
    Likes Received:
    Windows 10
    What is AdSMS ?

    AdSMS is a Trojan horse for mobile phones running Android 2.1 or greater. It registers to service provider phone numbers and sends SMS to those phone numbers. Those tasks are done without consent of the victim.
    The malicious package often disguises itself as a mobile phone update package.

    Am I infected?

    This is a screenshot of this malicious app.:

    Removal Instructions

    1. Open the Google Android Menu.
    2. Go to the Settings icon and select Applications.
    3. Next, click Manage.
    4. Select the application and click the Uninstall button.

    If you are still experiencing problems on your machine, please start a new thread here.

    How can I prevent these infections?

    The Android platform’s open nature makes it more attractive to cybercriminals than many other mobile operating systems. Even though the steps may seem obvious or overly simple, we can’t stress their importance enough.

    1. Use your smartphone’s built-in security features - Knowing how to activate a smartphone’s security features is a step in the right direction. We strongly urge users to familiarize themselves with and take advantage of their smartphone’s built-in security features.
    2. Disable Wi-Fi auto-connect - To fulfill its intended final payload the Android malware needs to access several URLs to upload the stolen data. Enabling the Wi-Fi auto-connect option can help the malware do this faster. Disabling this option can delay or even prevent further infection.
    3. Block apps from third-party store
    4. Carefully review the permissions an app is asking for before allowing them.

    5. Verify the app’s publisher before installing it - It may serve better to carefully check details about the apps’ publishers, such as when they signed up for app developer registration, how many apps they’ve already published, and what their customers say about their apps. Users should be alarmed if they see well-known apps created by popular developers published or posted by new and unknown publishers. Knowing when the app was uploaded may also hint at its authenticity.
    6. Install a mobile security app - Last but not least, installing an effective mobile security app is highly recommended.
      A security-conscious user should consider this attack as a test bed for more harmful cybercrimes in the future.

      All major antivirus software vendors offer Mobile Security products :
    #1 Jack, Aug 10, 2011
    Last edited: Jan 9, 2014
Other threads that you may like Forum Date
HOW DO I REMOVE FBI SCREEN HOSTAGE ON MY ANDROID PHONE? Android, iOS and Mac Malware Removal Support Today at 7:21 AM
Remove lines of "skipped" files from log Kaspersky Saturday at 9:33 AM
chrome malware? and Rootkit impossible to remove Malware Removal Assistance Thursday at 11:03 PM