DroidDream is a mobile botnet type of malware that appeared in spring 2011. The DroidDream Trojan gained root access to Google Android mobile devices in order to access unique identification information for the phone. Once compromised, a DroidDream-infected phone could also download additional malicious programs without the user’s knowledge as well as open the phone up to control by hackers.
DroidDream affected mobile devices running v2.2 (FroYo) and earlier versions of the Android OS operating system, and entered phones through the download and installation of one of 50+ third-party applications that were available on Google's official Android Market. Google removed the apps from its marketplace and had to utilize its "kill switch" to remotely wipe Android devices that had been infected by DroidDream.
DroidDream got its name from the fact that it was set up to run between the hours of 11pm and 8am when users were most likely to be sleeping and their phones less likely to be in use. Additional variants of DroidDream have since appeared, including DroidDream Light in June 2011 and a variant of DroidDream Light that appeared a month later.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
Webopedia's student apps roundup will help you to better organize your class schedule and stay on top of assignments and homework. Read More »List of Free Shorten URL Services
A URL shortener is a way to make a long Web address shorter. Try this list of free services. Read More »Top 10 Tech Terms of 2015
The most popular Webopedia definitions of 2015. Read More »
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »Computer Architecture Study Guide
This Webopedia study guide describes the different parts of a computer system and their relations. Read More »What Are Network Topologies?
Network Topology refers to layout of a network. How different nodes in a network are connected to each other and how they communicate is... Read More »