Since the birth of telecom fraud, it has spread rapidly. The scam method has been updated with the development of technology. With the popularity of Android devices, the scam method has been further upgraded. Android Trojans have also begun to be applied to telecom fraud. 360 烽火实验室The Trojan has maintained continuous attention. As early as 2016, it published a report on Internet telecom fraud, “In-depth analysis of cross-platform network telecom fraud”, and in-depth analysis of the entire process of reducing cross-platform network telecom fraud.