Trojan

Dog Wars app hides a Trojan

The last time we talked about the Dog Wars app was back in April when Michael Vick spoke out against it after getting busted for running a dog fighting ring. That app is still around and now, there are reports that the app has been infected with a Trojan. The Trojan in this case is less "steal from you" and more "embarrass you."

Android Virus Served up by User MYOURNET

As you're reading this, the threat is essentially over, that is, supposing you didn't download the apps in question before Google shut this whole situation down. As this sort of thing requires action first, details second, we'll begin by saying that all of the apps that were serving Malware were hosted by user MYOURNET and should now be taken down from the Android Marketplace. The full list of these apps can be found below.

[ALERT] New Trojan called Hong Tou Tou lurking

One of the good things about Android is that it's open source. But on the other hand, that also means it can sometimes be the Wild West out there with exploits sneaking in under the guise of legitimate looking apps. Such is the case as Lookout's official blog has an alert for a Trojan known as "Hong Tou Tou."

Lookout Mobile Security Analyzes that Super Evil Geinimi Trojan

Oh that crappy ol' Geinimi Trojan making its way around the Android world has been analyzed those superheroes of mobile security: Lookout (or lookout, with the lower-case L if you please.) Making a big bad name for themselves since their inception, this is definitely a power-play on the part of those that plant the nice green leaf at the upper-left of your Android screen. They've taken the time to take apart the trojan for your pleasure and so that you might be smart when it comes to avoiding or, god forbid, dealing with it.

Geinimi Android trojan piggybacks 3rd-party apps & sends personal info to hackers

A new Android trojan has been discovered, Geinimi, capable of stripping information from a user's device and sending that to a third-party, or even allowing the handset's functionality to be remotely controlled. According to Lookout, the Geinimi malware is installed as a side-effect of compromised third-party applications; these have been found in Chinese app stores. Installed, the trojan sends the phone's location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI) to remote servers. Titles in the Android Market are clean, however, so only those users who side-load apps onto their smartphones should be at risk. Still, it's a good idea to check the security permissions on each app rather than blindly stab at the OK button, since these compromised Geinimi titles ask for far more access to your phone than a regular app might.

Another SMS Sending Trojan Released onto Android Devices

The latest SMS Trojan, Trojan-SMS-AndroidOS-FakePlayer-B, is now being distributed via Russian-language sites that are offering up video clips. Although it has not yet been spotted on any other sites, it could make it’s way to english based and other sites in the near future. When you visit this site on another mobile platform you receive the desired clip, however, if you are running the Android OS the trojan will download itself (with your unaware consent). This particular method of delivery implies that the people who are running and hosting these sites are in on the scam and it’s not accidental.
1 2