New Trojan Could Be Trouble For Android UsersNew Trojan Could Be Trouble For Android Users
Android malware is first to be able to receive instructions remotely and join botnets
January 3, 2011
A new, more sophisticated Trojan for Android devices has been spotting lurking on third-party Chinese Android app markets, researchers said last week.
According to a report by Help Net Security, researchers at the security firm Lookout believe the new Trojan, dubbed "Geinimi," is the first-ever piece of Android malware that has the capability to receive instructions from a remote server and thus become part of a botnet.
"Geinimi is attached to compromised versions of legitimate applications -- mostly games such as Monkey Jump 2, President vs. Aliens, City Defense, and Baseball Superstars 2010," the report states.
"So far, Geinimi has been spotted being distributed only through third-party Chinese app stores," according to Help Net Security. "Versions of these applications on the official Google Android Market have not been compromised."
Until now, the server hasn't been spotted sending instructions to the Trojan, so its final purpose is not yet clear, the researchers told Help Net Security. The malware can download and prompt the user to install or uninstall an app or transmit a list of all the installed apps on the device to the server.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Modernize your Security Operations with Human-Machine Intelligence
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report