News & Announcements

Geinimi, Sophisticated New Android Trojan Found in Wild

The Threat:
A new Trojan affecting Android devices has recently emerged in China. Dubbed “Geinimi” based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user’s phone and send it to remote servers. The most sophisticated Android malware we’ve seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user’s phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone.

Geinimi is effectively being “grafted” onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Though the intent of this Trojan isn’t entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet.

Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. If you are already a Lookout user (free or premium), you are protected and no action is needed.

How it Works:
When a host application containing Geinimi is launched on a user’s phone, the Trojan runs in the background and collects significant information that can compromise a user’s privacy. The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server. Continue reading …

Related Posts

Data and Goliath: Digital surveillance and what you can do about it Data and Goliath is the title of a soon-to-be published book by Bruce Schneier, a well-known figure in cryptography and currently the Chief Technology...
SSLMate: Buy and install DV SSL certificates from the command line Looking for a tool to facilitate buying and installing SSL certificates for your website? SSLMate to the rescue! SSLMate is the second and latest t...
Why did this server run out of disk space? Less than two hours after I logged into the admin end of this website, which is powered by WordPress, the site went offline, with a 502 Bad Gateway er...
Slate 21: HP’s Android-powered All-in-One computer First came the Slate 7, HP's Android-powered tablet computer. Now HP is about to release a 21.5 inch sibling - the Slate 21. This was what I hoped tha...
Getting Ansible Working on Fedora 23 Ansible is a simple IT automation platform written in python that makes your applications and systems easier to deploy. It has become quite popular ov...
Steam OS, Steam Machines and Valve Software’s “multiple partners” I think Valve Software has grabbed the most headlines this week with the announcement of Steam OS and the Steam Machine. And Sabayon's lead developer ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Geinimi, Sophisticated New Android Trojan Found in Wild -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*