Thursday, December 30, 2010

Trojan Grabs Private Information from Android Devices


A new Trojan is targeting Android devices. Known in security circles as Geinimi, the Trojan is powerful enough to compromise the personal data on a user's smartphone and send it to remote servers. So says Lookout Mobile Security. In fact, the firm said the new Trojan is the most sophisticated Android malware its security researchers have seen to date. What's more, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. That means once the malware is installed on a user's phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone. "Geinimi is effectively being 'grafted' onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets," the company wrote in a blog post. "The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions."

Protecting Your Phone
The good news for Android users is Lookout said there is no evidence that Geinimi is distributed through third-party Chinese app stores. To download an app from a third-party app store, Android users need to enable the installation of apps from "unknown sources." Although Geinimi could be packaged into applications for Android phones in other geographic regions, Lookout has not seen any applications compromised by the Geinimi Trojan in the official Google Android Market. There are a number of applications -- typically games -- we have seen repackaged with the Geinimi Trojan and posted in Chinese app stores, including Monkey Jump 2, Sex Positions, President vs Aliens, City Defense, and Baseball Superstars 2010," Lookout said. "It is important to remember that even though there are instances of the games repackaged with the Trojan, the original versions available in the official Google Android Market have not been affected.


Lookout said Android users can stay safe by only downloading applications from trusted sources, such as reputable application markets, by always checking the permissions an app requests, by being aware of unusual behavior on the phone, and by downloading a mobile security app.

No comments:

Post a Comment