Android Trojan dubbed ‘Geinimi’ found in legitimate applications

Dec 30, 2010 by John Messina report

There’s a new threat affecting Android devices; the Trojan dubbed ‘Geinimi’ originates from China and is capable of gathering a significant amount of personal data from a user’s phone and send it to remote servers.

According to Lookout Mobile Security firm, Geinimi is the first malware that displays botnet-like capabilities. Once the malware has been installed on the user’s phone it can be taken over by receiving commands from a remote server.

Lookout states that Geinimi is effectively being “grafted” onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets.

Some of the games that Lookout has identified are: Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010. These are instances of the games repackaged with the Trojan; the original versions are available in the official Google Android Market and are not affected.

At the time of this writing, Geinimi has only been found being distributed through third-party Chinese app stores. Lookout has not found any applications compromised by the Geinimi in the official Google Android Market.

Protect yourself by only downloading from trusted sources and always check out the developer’s name and user reviews. Always check the apps permission request and stay alert on any unusual behavior your phone might exhibit after installing an app. By not enabling “Unknown sources” in your Android device, will prevent you from downloading third party apps.

Explore further: Hackathon team's GoogolPlex gives Siri extra powers

More information: blog.mylookout.com/2010/12/geinimi_trojan/

Related Stories

Virus sends costly messages from Android phones

Aug 11, 2010

Mobile security firm Lookout on Tuesday warned that a booby-trapped Movie Player application is infecting Android phones in Russia with a virus that sends costly text messages.

How Secure are iPhone and Android Apps

Apr 01, 2010

(PhysOrg.com) -- Today's smartphones are pocket size computers that can be customized by downloading applications. This is what makes a smartphone vulnerable to cybercriminals. In this article we will examine ...

Google Releases DIY Android App Inventor (w/ Video)

Jul 12, 2010

(PhysOrg.com) -- Google has announced a new software development program that lets anyone develop an application for Android devices; it’s called the App Inventor for Android. Google says the software is ...

Recommended for you

Hackathon team's GoogolPlex gives Siri extra powers

4 hours ago

(Phys.org) —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Microsoft CEO is driving data-culture mindset

Apr 16, 2014

(Phys.org) —Microsoft's future strategy: is all about leveraging data, from different sources, coming together using one cohesive Microsoft architecture. Microsoft CEO Satya Nadella on Tuesday, both in ...

User comments : 9

Adjust slider to filter visible comments by rank

Display comments: newest first

kevinrtrs
1.5 / 5 (4) Dec 31, 2010
Here we go again....just who is infecting the code?

Could it be the ones who have most to lose with lost sales?
Or is it the one who have most to gain by exploiting people's astonishing tendencies to want something of value for nothing or next-to-nothing?

I find it so incredible that people will go to such lengths to make money in a criminal fashion when it might actually be very profitable to put the same effort into doing it legally and ethically.

Totally mind-blowing.

SDrapak
1 / 5 (3) Dec 31, 2010
It's the luser with no girlfriend, no place of their own other than their mama's house and no self esteem, thinking that they can somehow get some cred by being a bigger loser and prick and annoying thousands of people.
Getting a life would go much further. As a bonus that's not a felony.
JimB135
2 / 5 (3) Dec 31, 2010
It's such a PITA that we have to be constantly vigilant about viruses and malware with our windows machines. Now the next big wave could be our smartphones? Could it be that we will start having to install antivirus software on our smartphones right out of the box just like our windows machines?
Skeptic_Heretic
5 / 5 (1) Dec 31, 2010
The entire ordeal is avoidable if you're not using third party app providers based in China.
Quantum_Conundrum
not rated yet Dec 31, 2010
Now the next big wave could be our smartphones? Could it be that we will start having to install antivirus software on our smartphones right out of the box just like our windows machines?


Duh.

Any time you're installing software not made by yourself, there's a chance it has malware in it. Doesn't matter what your hardware or OS is.
zslewis91
1.5 / 5 (2) Dec 31, 2010
@SDrpak, im an EECS grad student, i speak code, like-wise with all of my buddies...we all have wives or girlfriends, like most people in the code comm....you must not know any hackers... most of us are twice as successful as you will ever be. most of us have done more with our lives then you, your mother, and fathers lives put together folded 30 times...fun and profit, thats why its done. go read a book.
zslewis91
not rated yet Dec 31, 2010
@QC, Mr. "im so educated" and all the other garbage you speak...it seems strange for how "smart" clam, you seem to be incapable of differentiating "FACT" from "opinion"...i've seen how you operate...stating facts to set your opinion of which you are convinced to be truth...i dont clam to be wrong or right,and im not saying you are wrong or right..but anyone with a brain that reads your garbage day after day can be sure of one thing...and thats your sure of everything you say...and i think many of us find it to be quite comical. i gave you the benefit of the doubt...and then..you said the word.."""CREATION"""..any academic with a career would hold their toung, because anacadmic how has an IQ knows, in the world of science there are no scientific basis for your claims. so go ahead and pick this post a part, correct me of my flaws in thought, and grammatical errors, and all the inaccuracies in my claims wallow in your truth, because it's yours and yours alone...ill go read bible now:)
jamesrm
5 / 5 (1) Dec 31, 2010
Don't feed the trolls, partucularly Quantuum Kuntnumbum

rgds
jms
zslewis91
not rated yet Dec 31, 2010
hahaha, thanks @jamesrm...your right and im done..i just cant stand the being.

More news stories

Hackathon team's GoogolPlex gives Siri extra powers

(Phys.org) —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Better thermal-imaging lens from waste sulfur

Sulfur left over from refining fossil fuels can be transformed into cheap, lightweight, plastic lenses for infrared devices, including night-vision goggles, a University of Arizona-led international team ...

Deadly human pathogen Cryptococcus fully sequenced

Within each strand of DNA lies the blueprint for building an organism, along with the keys to its evolution and survival. These genetic instructions can give valuable insight into why pathogens like Cryptococcus ne ...