Malware usually pretended some interesting application to
allure uses to install it. After it is installed and started, it will
steal user’s personal information and leak it to remote
destination for evil purpose, and some malware will start paid
service while the user not knows. Other’s attack methods
including utilizing the vulnerability of Android’s authorization
management to promote malware’s permission to do evil
activities and so on.