APPLICATION/FILE Threat Classifications
Classification | Description |
---|---|
|
Automatically displays ads. |
|
Downloads and/or installs additional apps on a device. |
|
Allows a third party to access or control a device. |
|
Blacklisted apps are defined by MES Console administrators. The MES console and Mobile Risk API v2 refer to this classification as DENYLISTED_APP. |
|
Automatically performs specific operations. |
|
Sends premium messages or executes other actions that charge the user. |
|
Executes actions without user permission, such as subscribing to paid services. |
|
The app uses Bluetooth or Near Field Communication (NFC) in a manner that leaves the device vulnerable. |
|
The app may not be malicious, but it transmits data in an unsecured manner. |
|
The app uses OS flaws to gain elevated privileges. |
|
A non-App Store signer indicates that an app has been installed from a source other than the iOS App Store. |
|
The author of the app has signed malicious or potentially unwanted applications in the past. |
|
Lets a user acquire and manage root access. |
|
Sideloaded apps are apps installed from a source other than an official app store. |
|
Uses the device to send spam via calls or SMS. |
|
Sends user and device information to a third party. |
|
Monitors device activity and sends information to a third party. |
|
Fraudulently charge users. |
|
Claims to be something else, but is malicious and can cause data theft or loss of control over a device. |
|
Runs and replicates itself after a user accesses a compromised file or program. |
|
The app itself may not be malicious, but it exposes the device to potential threats by having known vulnerabilities. |
|
A virus that can replicate and spread without the use of a host file. |