Breaking News

Gigabyte announces X870 and B850 AORUS STEALTH ICE Samsung Launches Odyssey G6 World’s First 500Hz OLED Gaming Monitor Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability Razer announces Clio Chair Accessory for Audio Immersion Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Geinimi Android Trojan Found China

Geinimi Android Trojan Found China

Smartphones Dec 31,2010 0

A new Trojan affecting Android devices has recently emerged in China. Dubbed "Geinimi" based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user?s phone and send it to remote servers, security researchers said on Thursday. Anti-virus firm Lookout Mobile Security said that Geinimi is the most sophisticated Android malware so far and also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user?s phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone.

Geinimi is effectively being "grafted" onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets, the reserachers said. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Though the intent of this Trojan isn?t entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet.

How it works:

When a host application containing Geinimi is launched on a user?s phone, the Trojan runs in the background and collects significant information that can compromise a user?s privacy. The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server.

Though Lookout Mobile Security has seen Geinimi communicate with a live server and transmit device data, the security firm has yet to observe a fully operational control server sending commands back to the Trojan. The analysis of Geinimi?s code is ongoing and the reserachers have already evidence of the following capabilities:

* Send location coordinates (fine location)
* Send device identifiers (IMEI and IMSI)
* Download and prompt the user to install an app
* Prompt the user to uninstall an app
* Enumerate and send a list of installed apps to the server

While Geinimi can remotely initiate an app to be downloaded or uninstalled on a phone, a user still needs to confirm the installation or uninstallation.

"Geinimi?s author(s) have raised the sophistication bar significantly over and above previously observed Android malware by employing techniques to obfuscate its activities. In addition to using an off-the-shelf bytecode obfuscator, significant chunks of command-and-control data are encrypted. While the techniques were easily identified and failed to thwart analysis, they did substantially increase the level of effort required to analyze the malware. The Lookout Security team is continuing to analyze capabilities of new and existing Geinimi variants and will provide more information as we uncover it," teh security experts said.

Currently Geinimi is distributed through third-party Chinese app stores. To download an app from a third-party app store, Android users need to enable the installation of apps from "Unknown sources" (often called "sideloading"). Geinimi could be packaged into applications for Android phones in other geographic regions. Lookout Mobile Security has not seen any applications compromised by the Geinimi Trojan in the official Google Android Market.

There are a number of applications?typically games? seen repackaged with the Geinimi Trojan and posted in Chinese app stores, including Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010. It is important to remember that even though there are instances of the games repackaged with the Trojan, the original versions available in the official Google Android Market have not been affected.

Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan.

How to Stay Safe:

* Only download applications from trusted sources, such as reputable application markets. Remember to look at the developer name, reviews, and star ratings.
* Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides.
* Be aware that unusual behavior on your phone could be a sign that your phone is infected. Unusual behaviors include: unknown applications being installed without your knowledge, SMS messages being automatically sent to unknown recipients, or phone calls automatically being placed without you initiating them.
* Download a mobile security app for your phone that scans every app you download.

Tags: androidVirus
Previous Post
Facebook Tops Google As Most Visited Site in U.S.
Next Post
NOOK Line of eReading Devices Becomes Barnes & Noble?s Biggest Bestseller

Related Posts

  • What’s new in Android 15, plus more updates

  • Connecting all things Android at MWC Barcelona

  • New features for businesses in Android 13

  • Lucky number Android 13: The latest features and updates

  • What’s beta than Android 13?

  • HLDS UD Station DVDRW (Preview)

  • Android Gets a New Keyboard for Typing Braille

  • New Opera for Android Offers More Data Savings, New Blockchain-browsing Features

Latest News

Gigabyte announces X870 and B850 AORUS STEALTH ICE
PC components

Gigabyte announces X870 and B850 AORUS STEALTH ICE

Samsung Launches Odyssey G6 World’s First 500Hz OLED Gaming Monitor
Gaming

Samsung Launches Odyssey G6 World’s First 500Hz OLED Gaming Monitor

Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability
Smartphones

Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability

Razer announces Clio Chair Accessory for Audio Immersion
Consumer Electronics

Razer announces Clio Chair Accessory for Audio Immersion

Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go
PC components

Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Rock 5

be quiet! Dark Rock 5

G.skill Trident Z5 Neo RGB DDR5-6000 64GB CL30

G.skill Trident Z5 Neo RGB DDR5-6000 64GB CL30

Arctic Liquid Freezer III 420 - 360

Arctic Liquid Freezer III 420 - 360

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Crucial Pro OC 32GB DDR5-6000 CL36 White

Crucial Pro OC 32GB DDR5-6000 CL36 White

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed