Geinimi, Sophisticated New Android Trojan Found in Wild

The Threat:
A new Trojan affecting Android devices has recently emerged in China. Dubbed “Geinimi” based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user’s phone and send it to remote servers. The most sophisticated Android malware we’ve seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user’s phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone.

Geinimi is effectively being “grafted” onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Though the intent of this Trojan isn’t entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet.

Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. If you are already a Lookout user (free or premium), you are protected and no action is needed.

How it Works:
When a host application containing Geinimi is launched on a user’s phone, the Trojan runs in the background and collects significant information that can compromise a user’s privacy. The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server. Continue reading …

Related Posts

The problem with NoSQL databases NoSQL databases, whether they are truly "no SQL" or "not only SQL," defer differ from relational databases in one major respect; they tend to be easie...
Infotainment systems: The next generation Just thought I share a video about the Parrot ASTEROID Smart, a vehicular infotainment systems device from Parrot, a technology outfit based in Paris,...
Ubuntu Touch – SDK alpha and preview images released The Software Development Kit (SDK) and preview installation images for Ubuntu Touch have been released. Ubuntu Touch is the umbrella name for Ubuntu f...
Ubuntu and Mandela. Hope Shuttleworth still remembers what the former means In Southern Africa, the term ubuntu stands for kindness, humanity or human-ness. In fact in most of black Africa, that concept is deeply engrained in ...
The best tool for Fantasy Football analytics: Excel or R? In the early days, I used Excel for basic stuff, but I've been playing with R for some fun and funky data crunching. It's a nice tool to know how to u...
What is the best blogging platform built atop Node.js? After about six years of using WordPress as the blogging  platform for this website, I have come to the stage where I want to try something else. Some...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Geinimi, Sophisticated New Android Trojan Found in Wild -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*