Geinimi, Sophisticated New Android Trojan Found in Wild

The Threat:
A new Trojan affecting Android devices has recently emerged in China. Dubbed “Geinimi” based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user’s phone and send it to remote servers. The most sophisticated Android malware we’ve seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user’s phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone.

Geinimi is effectively being “grafted” onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Though the intent of this Trojan isn’t entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet.

Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. If you are already a Lookout user (free or premium), you are protected and no action is needed.

How it Works:
When a host application containing Geinimi is launched on a user’s phone, the Trojan runs in the background and collects significant information that can compromise a user’s privacy. The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server. Continue reading …

Related Posts

Keeping a Global Eye on Copyright Law We spend a lot of our time at EFF trying to spot new proposals in copyright across the world, and understanding whether they're good or bad for civil ...
How to create and maintain anonymous email accounts Don't let what happened to the director (actually, former director) of a very powerful government agency make you think that engaging in anonymous ema...
Introducing Distributed Data-structures in R The main goal of the “ddR” package is to provide a simple, generic data-structures, and functions that works across different backends such as R’s “pa...
FreeOTP now vailable for Android. Install it from Google Play FreeOTP is now available for Android and can be installed from Google Play. FreeOTP, which is based on open standards, is a "multi-factor authentic...
Open Source GIS systems to be used by Spanish Wine makers Wine makers in Spain will soon be able to use the gvSIG open source geographic information services developed in a large part with the help of severa...
What the future holds for PC-BSD PC-BSD is a multi-purpose distribution of FreeBSD. The last stable release is PC-BSD 9.1. Development and releases tend to be slow and infrequent, and...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Geinimi, Sophisticated New Android Trojan Found in Wild -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*